A novel blind signature scheme possessed with dual protections

Jonathan Jen Rong Chen*, An-Pin Chen, Richard Wen Mao Lin

*Corresponding author for this work

Research output: Contribution to conferencePaperpeer-review

1 Scopus citations

Abstract

The basic theories for designing digital signatures are factorization or discrete logarithm. Generally, when building an information system, the defense ability of the system will be relatively weak if using either discrete logarithm or factorization theories alone. A blind signature scheme allows a person to sign an unknown message from others without knowing the disclosure of the content. It can be widely applied to secret electronic voting, anonymous digital cash systems, database security...etc. In view of the high security and efficiency and the need of a mechanism of Blind Signature in the future informationalized society, it is definitely essential to work out a way to eliminate the negative factors developed while building the system. This paper is following the main idea mentioned above and provides a novel blind signature scheme.

Original languageEnglish
Pages123-127
Number of pages5
DOIs
StatePublished - 14 Oct 2003
EventProceedings: 37th Annual 2003 International Carnahan Conference on Security Technology - Taipei, Taiwan
Duration: 14 Oct 200316 Oct 2003

Conference

ConferenceProceedings: 37th Annual 2003 International Carnahan Conference on Security Technology
Country/TerritoryTaiwan
CityTaipei
Period14/10/0316/10/03

Keywords

  • Blind Signature
  • Discrete Logarithm
  • Dual-Complexities
  • Factorization

Fingerprint

Dive into the research topics of 'A novel blind signature scheme possessed with dual protections'. Together they form a unique fingerprint.

Cite this