Proxy Blind Signature Scheme

@article{Awasthi2003ProxyBS,
  title={Proxy Blind Signature Scheme},
  author={Amit K. Awasthi and Sunder Lal},
  journal={IACR Cryptology ePrint Archive},
  year={2003},
  volume={2003},
  pages={72}
}
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitted to spend an e-coin, he is in need to fulfill above requirements of blind signature. This paper proposes a proxy blind signature scheme with which a proxy is able to make proxy blind signature which verifier is able to verify in a way similar to proxy signature schemes. 

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 61 CITATIONS, ESTIMATED 98% COVERAGE

Design for Enhanced Security and Convenience of E-Voting Scheme

Pin-Chang, R Su, Yui-Chong
  • 2015
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Analysis on the generalization of proxy signature

  • Security and Communication Networks
  • 2013
VIEW 13 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A New Proxy Blind Signature Scheme Based on DLP

VIEW 5 EXCERPTS
CITES RESULTS & BACKGROUND
HIGHLY INFLUENCED

Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel

  • 2009 Fifth International Conference on Information Assurance and Security
  • 2009
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Provably Secure Proxy Blind Signature Scheme

  • Eighth IEEE International Symposium on Multimedia (ISM'06)
  • 2006
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

On the Security of Some Proxy Blind Signature Schemes

VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Security Analysis of Lal and Awasthi's Proxy Signature Schemes

  • IACR Cryptology ePrint Archive
  • 2003
VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Certificateless Proxy Signature and Its Extension to Blind Signature

  • 2010 Fourth International Conference on Network and System Security
  • 2010
VIEW 1 EXCERPT
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2003
2017

CITATION STATISTICS

  • 11 Highly Influenced Citations

  • Averaged 2 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-8 OF 8 REFERENCES

Similar Papers

Loading similar papers…