Learn More
Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in many applications. In this paper, we present a new proxy blind signature scheme based on discrete logarithm problem, which satisfies the secure properties of both the blind signature scheme and the proxy signature scheme. As compared with existing(More)
Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in many applications. Based on ECLDP, Wang et al. recently proposed a proxy blind signature scheme. In this paper, we present a security analysis on Wang's scheme and prove it does not possess the strong nonrepudiation, strong unforgeability and(More)
A fair exchange protocol allows two parties to exchange items in a fair way so that either each party gets the other's item or neither party does. In this paper, we propose a key-exposure-free chameleon hashing scheme based on the discrete logarithm assumption, and prove that it enjoys all advantages of previous schemes: collision resistant, semantic(More)
Privacy-preserving cooperative linear system of equations problem is an important scientific computation and widely used in many areas such as banking, manufacturing, and telecommunications. In this paper, we present a new privacy- preserving cooperative linear system of equations protocol under the semi-honest mode, which is more efficient as compared with(More)
  • 1