完整後設資料紀錄
DC 欄位語言
dc.contributor.authorWu, LCen_US
dc.contributor.authorYeh, YSen_US
dc.contributor.authorLiu, TSen_US
dc.date.accessioned2014-12-08T15:17:30Z-
dc.date.available2014-12-08T15:17:30Z-
dc.date.issued2006-02-01en_US
dc.identifier.issn0164-1212en_US
dc.identifier.urihttp://dx.doi.org/10.1016/j.jss.2005.05.007en_US
dc.identifier.urihttp://hdl.handle.net/11536/12686-
dc.description.abstractThe proxy blind signature scheme allows the designated proxy signer using the proxy secret key to generate a blind signature on behalf of the original signer. Tan et al. presented the DLP-based and ECDLP based blind signature schemes. Awasthi and Lal proposed a improved DLP-based scheme later. Recently, Sun et al. presented linkability attack on Tan et al.'s and Awasthi-Lal's proxy blind signature schemes respectively. In this paper, we show that Sun et al.'s attack is failed and these schemes are still satisfy the unlinkability property. (C) 2005 Elsevier Inc. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectunlinkabilityen_US
dc.subjectblind signatureen_US
dc.subjectproxy signatureen_US
dc.subjectdigital signatureen_US
dc.subjectcryptographyen_US
dc.titleAnalysis of Sun et al.'s linkability attack on some proxy blind signature schemesen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/j.jss.2005.05.007en_US
dc.identifier.journalJOURNAL OF SYSTEMS AND SOFTWAREen_US
dc.citation.volume79en_US
dc.citation.issue2en_US
dc.citation.spage176en_US
dc.citation.epage179en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000235818400003-
dc.citation.woscount2-
顯示於類別:期刊論文


文件中的檔案:

  1. 000235818400003.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。