Learn More
Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in many applications. In this paper, we present a new proxy blind signature scheme based on discrete logarithm problem, which satisfies the secure properties of both the blind signature scheme and the proxy signature scheme. As compared with existing(More)
A fair exchange protocol allows two parties to exchange items in a fair way so that either each party gets the other's item or neither party does. In this paper, we propose a key-exposure-free chameleon hashing scheme based on the discrete logarithm assumption, and prove that it enjoys all advantages of previous schemes: collision resistant, semantic(More)
Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in many applications. Based on ECLDP, Wang et al. recently proposed a proxy blind signature scheme. In this paper, we present a security analysis on Wang's scheme and prove it does not possess the strong nonrepudiation, strong unforgeability and(More)
Privacy-preserving cooperative linear system of equations problem is an important scientific computation and widely used in many areas such as banking, manufacturing, and telecommunications. In this paper, we present a new privacy- preserving cooperative linear system of equations protocol under the semi-honest mode, which is more efficient as compared with(More)
  • 1