2002
DOI: 10.1007/3-540-45861-1_24
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Provably Secure Threshold Blind Signature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…And Kim et al [15] also put forth an efficient and provably secure threshold blind signature scheme, which was claimed more efficient and more secure compared with the former schemes [11,12] . More recently, Vo et al [16] proposed a new threshold blind signature from bilinear parings.…”
Section: Introductionmentioning
confidence: 97%
“…And Kim et al [15] also put forth an efficient and provably secure threshold blind signature scheme, which was claimed more efficient and more secure compared with the former schemes [11,12] . More recently, Vo et al [16] proposed a new threshold blind signature from bilinear parings.…”
Section: Introductionmentioning
confidence: 97%
“…Our partially blind fuzzy signatures are compatible with the ECDSA signatures in the existing Bitcoin system, but allow to enforces flexible and complicated security policies. The partially blind threshold signatures with uncertain signers are employed to prevent the platform from observing the details of transactions (Jinho et al 2002;Cui et al 2007) to guarantee privacy for the users. The schemes also protect the trading platforms by allowing them to embed some public information negotiated with the recipients in advance to avoid the privacy-preserving mechanism is abused.…”
Section: Introductionmentioning
confidence: 99%
“…In 1994, the blinding schemes [17] of the modification of DSA scheme and Nyberg-Rueppel message recovery signature scheme were presented by Camenisch. Because blind signatures [2,5,6,7,8,9,10] can realize privacy protect of the user, it has been widely used in numerous electronic commerce security, most prominently in anonymous voting and anonymous e-cash.…”
Section: Introductionmentioning
confidence: 99%