Full metadata record
DC FieldValueLanguage
dc.contributor.authorWu, LCen_US
dc.contributor.authorYeh, YSen_US
dc.contributor.authorLiu, TSen_US
dc.date.accessioned2014-12-08T15:17:30Z-
dc.date.available2014-12-08T15:17:30Z-
dc.date.issued2006-02-01en_US
dc.identifier.issn0164-1212en_US
dc.identifier.urihttp://dx.doi.org/10.1016/j.jss.2005.05.007en_US
dc.identifier.urihttp://hdl.handle.net/11536/12686-
dc.description.abstractThe proxy blind signature scheme allows the designated proxy signer using the proxy secret key to generate a blind signature on behalf of the original signer. Tan et al. presented the DLP-based and ECDLP based blind signature schemes. Awasthi and Lal proposed a improved DLP-based scheme later. Recently, Sun et al. presented linkability attack on Tan et al.'s and Awasthi-Lal's proxy blind signature schemes respectively. In this paper, we show that Sun et al.'s attack is failed and these schemes are still satisfy the unlinkability property. (C) 2005 Elsevier Inc. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectunlinkabilityen_US
dc.subjectblind signatureen_US
dc.subjectproxy signatureen_US
dc.subjectdigital signatureen_US
dc.subjectcryptographyen_US
dc.titleAnalysis of Sun et al.'s linkability attack on some proxy blind signature schemesen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/j.jss.2005.05.007en_US
dc.identifier.journalJOURNAL OF SYSTEMS AND SOFTWAREen_US
dc.citation.volume79en_US
dc.citation.issue2en_US
dc.citation.spage176en_US
dc.citation.epage179en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000235818400003-
dc.citation.woscount2-
Appears in Collections:Articles


Files in This Item:

  1. 000235818400003.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.