完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Wu, LC | en_US |
dc.contributor.author | Yeh, YS | en_US |
dc.contributor.author | Liu, TS | en_US |
dc.date.accessioned | 2014-12-08T15:17:30Z | - |
dc.date.available | 2014-12-08T15:17:30Z | - |
dc.date.issued | 2006-02-01 | en_US |
dc.identifier.issn | 0164-1212 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/j.jss.2005.05.007 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/12686 | - |
dc.description.abstract | The proxy blind signature scheme allows the designated proxy signer using the proxy secret key to generate a blind signature on behalf of the original signer. Tan et al. presented the DLP-based and ECDLP based blind signature schemes. Awasthi and Lal proposed a improved DLP-based scheme later. Recently, Sun et al. presented linkability attack on Tan et al.'s and Awasthi-Lal's proxy blind signature schemes respectively. In this paper, we show that Sun et al.'s attack is failed and these schemes are still satisfy the unlinkability property. (C) 2005 Elsevier Inc. All rights reserved. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | unlinkability | en_US |
dc.subject | blind signature | en_US |
dc.subject | proxy signature | en_US |
dc.subject | digital signature | en_US |
dc.subject | cryptography | en_US |
dc.title | Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/j.jss.2005.05.007 | en_US |
dc.identifier.journal | JOURNAL OF SYSTEMS AND SOFTWARE | en_US |
dc.citation.volume | 79 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 176 | en_US |
dc.citation.epage | 179 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000235818400003 | - |
dc.citation.woscount | 2 | - |
顯示於類別: | 期刊論文 |