ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Blind signature and ring signature schemes: Rehabilitation and attack
Computer Standards & Interfaces
◽
10.1016/j.csi.2008.09.002
◽
2009
◽
Vol 31
(4)
◽
pp. 707-712
◽
Cited By ~ 7
Author(s):
Sherman S.M. Chow
Keyword(s):
Blind Signature
◽
Signature Schemes
◽
Ring Signature
Download Full-text
Related Documents
Cited By
References
Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes
IEEE Access
◽
10.1109/access.2021.3113938
◽
2021
◽
Vol 9
◽
pp. 134427-134434
Author(s):
Kyung-Ah Shim
◽
Youngjoo An
Keyword(s):
Blind Signature
◽
Signature Schemes
◽
Ring Signature
Download Full-text
A comparison between traceable and untraceable blind signature schemes through simulation
2013 International Conference on Informatics, Electronics and Vision (ICIEV)
◽
10.1109/iciev.2013.6572710
◽
2013
◽
Cited By ~ 1
Author(s):
Kazi Md. Rokibul Alam
◽
Saifuddin Mahmud
◽
Mohammad Nazmul Alam Khan
Keyword(s):
Blind Signature
◽
Signature Schemes
Download Full-text
A comparison between RSA and ElGamal based untraceable blind signature schemes
2016 International Conference on Networking Systems and Security (NSysS)
◽
10.1109/nsyss.2016.7400705
◽
2016
◽
Cited By ~ 2
Author(s):
Khairul Alam
◽
Kazi Rokibul Alam
◽
Omar Faruq
◽
Yasuhiko Morimoto
Keyword(s):
Blind Signature
◽
Signature Schemes
Download Full-text
A comparative performance analysis of several blind signature schemes
2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control
◽
10.1109/iceee.2008.4723460
◽
2008
◽
Cited By ~ 2
Author(s):
Lourdes Lopez-Garcia
◽
Luis Martinez-Ramos
◽
Francisco Rodriguez-Henriquez
Keyword(s):
Performance Analysis
◽
Blind Signature
◽
Comparative Performance
◽
Signature Schemes
Download Full-text
Boosting the Security of Blind Signature Schemes
10.1007/978-3-030-92068-5_16
◽
2021
◽
pp. 468-492
Author(s):
Jonathan Katz
◽
Julian Loss
◽
Michael Rosenberg
Keyword(s):
Blind Signature
◽
Signature Schemes
Download Full-text
Forking Lemmas for Ring Signature Schemes
Progress in Cryptology - INDOCRYPT 2003 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-24582-7_20
◽
2003
◽
pp. 266-279
◽
Cited By ~ 63
Author(s):
Javier Herranz
◽
Germán Sáez
Keyword(s):
Signature Schemes
◽
Ring Signature
Download Full-text
The Fiat–Shamir Transform for Group and Ring Signature Schemes
Lecture Notes in Computer Science - Security and Cryptography for Networks
◽
10.1007/978-3-642-15317-4_23
◽
2010
◽
pp. 363-380
◽
Cited By ~ 1
Author(s):
Ming Feng Lee
◽
Nigel P. Smart
◽
Bogdan Warinschi
Keyword(s):
Signature Schemes
◽
Ring Signature
Download Full-text
Efficienct ID-Based Proxy Blind Signature Schemes from Pairings
2008 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2008.101
◽
2008
◽
Cited By ~ 1
Author(s):
Pan Heng
◽
Ke Ke
◽
Chunxiang Gu
Keyword(s):
Blind Signature
◽
Signature Schemes
◽
Proxy Blind Signature
Download Full-text
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST
Information and Communications Security - Lecture Notes in Computer Science
◽
10.1007/978-3-540-39927-8_4
◽
2003
◽
pp. 34-46
◽
Cited By ~ 28
Author(s):
Duncan S. Wong
◽
Karyin Fung
◽
Joseph K. Liu
◽
Victor K. Wei
Keyword(s):
Signature Schemes
◽
Ring Signature
◽
Code Construction
◽
Rs Code
◽
Threshold Setting
Download Full-text
On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes
2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
◽
10.1109/dasc.2009.36
◽
2009
◽
Cited By ~ 1
Author(s):
Jianhong Zhang
◽
Hua Chen
◽
Shengnan Gao
Keyword(s):
Security Analysis
◽
Blind Signature
◽
Signature Schemes
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close