We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,642 results
  1. A Certificateless-Based Blind Signature Scheme with Message Recovery

    Blind signature is a digital signature technology that enables the signature requester to obtain the valid signature of the signer without revealing...
    **ao Li, Mengwen Wang, Fengyin Li in Machine Learning for Cyber Security
    Conference paper 2023
  2. A Survey on Identity-Based Blind Signature

    Blind signatures are well-studied building blocks of cryptography, originally designed to enable anonymity in electronic voting and digital banking....
    Mirko Koscina, Pascal Lafourcade, ... Léo Robert in Foundations and Practice of Security
    Conference paper 2023
  3. Snowblind: A Threshold Blind Signature in Pairing-Free Groups

    Both threshold and blind signatures have, individually, received a considerable amount of attention. However little is known about their combination,...
    Elizabeth Crites, Chelsea Komlo, ... Chenzhi Zhu in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  4. Generic Construction for Identity-Based Proxy Blind Signature

    Generic constructions of blind signature schemes have been studied since its appearance. Several constructions were made leading to generic blind...
    Xavier Bultel, Pascal Lafourcade, ... Léo Robert in Foundations and Practice of Security
    Conference paper 2022
  5. Blind Signature

    Living reference work entry 2022
  6. An Improved Certificateless Partial Blind Signature Scheme Based on Homomorphic Encryption

    A modified Paillier homomorphic cryptography-based partial blind signature scheme is proposed to address the problems of centralized key generation...
    Pengfei Tan, Zhi Qin, ... **yue **a in Advances in Artificial Intelligence and Security
    Conference paper 2022
  7. Chaum Blind Signature Scheme

    Marta Bellés-Muñoz, Vanesa Daza in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2022
  8. A survey on lattice-based digital signature

    Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich...

    Fengxia Liu, Zhiyong Zheng, ... Qun Xu in Cybersecurity
    Article Open access 01 April 2024
  9. On Pairing-Free Blind Signature Schemes in the Algebraic Group Model

    Studying the security and efficiency of blind signatures is an important goal for privacy sensitive applications. In particular, for large-scale...
    Julia Kastner, Julian Loss, Jiayu Xu in Public-Key Cryptography – PKC 2022
    Conference paper 2022
  10. A New Framework for More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling

    Blind signatures, proposed by Chaum (CRYPTO’82), are interactive protocols between a signer and a user, where a user can obtain a signature without...
    Rafael del Pino, Shuichi Katsumata in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  11. The Abe-Okamoto Partially Blind Signature Scheme Revisited

    Partially blind signatures, an extension of ordinary blind signatures, are a primitive with wide applications in e-cash and electronic voting. One of...
    Julia Kastner, Julian Loss, Jiayu Xu in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  12. Concurrently Secure Blind Schnorr Signatures

    Many applications of blind signatures, e.g. in blockchains, require compatibility of the resulting signatures with the existing system. This makes...
    Georg Fuchsbauer, Mathias Wolf in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  13. An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm

    The Chinese government releases the SM2 digital signature algorithm as one part of the Chinese public key crypto standard, and now it has become an...
    Yudi Zhang, Debiao He, ... Dawei Li in Information Security and Cryptology
    Conference paper 2021
  14. Rai-Choo! Evolving Blind Signatures to the Next Level

    Blind signatures are a fundamental tool for privacy-preserving applications. Known constructions of concurrently secure blind signature schemes...
    Lucjan Hanzlik, Julian Loss, Benedikt Wagner in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  15. Boosting the Security of Blind Signature Schemes

    Existing blind signature schemes that are secure for polynomially many concurrent executions of the signing protocol are either inefficient or rely...
    Jonathan Katz, Julian Loss, Michael Rosenberg in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  16. Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions

    Blind signatures serve as a foundational tool for privacy-preserving applications and have recently seen renewed interest due to new applications in...
    Shuichi Katsumata, Michael Reichle, Yusuke Sakai in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  17. Breaking Parallel ROS: Implication for Isogeny and Lattice-Based Blind Signatures

    Many of the three-round blind signatures based on identification protocols are only proven to be...
    Shuichi Katsumata, Yi-Fu Lai, Michael Reichle in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  18. A Correction to a Code-Based Blind Signature Scheme

    This work proposes a reparation to the flaw in the paper of Blazy et al. (IEEE 2017). The flaw lies in the proof of the unforgeability property. More...
    Olivier Blazy, Philippe Gaborit, Dang Truong Mac in Code-Based Cryptography
    Conference paper 2022
  19. Non-interactive Blind Signatures for Random Messages

    Blind signatures allow a signer to issue signatures on messages chosen by the signature recipient. The main property is that the recipient’s message...
    Conference paper 2023
  20. Proxy signature-based role delegation scheme: formal analysis and simulation

    In the security domain, wide variety of signature schemes are available for providing confidentiality, Integrity and non-repudiation. Proxy signature...

    Aparna Bannore, Rachana Y. Patil, ... Himani Deshpande in International Journal of Information Technology
    Article 14 May 2024
Did you find what you were looking for? Share feedback.