{"title":"A novel blind signature scheme possessed with dual protections","authors":"J. Jen-Rong Chen, An-Pin Chen, R. Wen-Mao Lin","doi":"10.1109/CCST.2003.1297547","DOIUrl":null,"url":null,"abstract":"The basic theories for designing digital signatures are factorization or discrete logarithm. Generally, when building an information system, the defense ability of the system is relatively weak if using either discrete logarithm or factorization theories alone. A blind signature scheme allows a person to sign an unknown message from others without knowing the disclosure of the content. It can be widely applied to secret electronic voting, anonymous digital cash systems, database security etc. In view of the high security and efficiency and the need of a mechanism of blind signature in the future informationalized society, it is definitely essential to work out a way to eliminate the negative factors developed while building the system. We follow the main idea mentioned above and provide a novel blind signature scheme.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2003.1297547","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The basic theories for designing digital signatures are factorization or discrete logarithm. Generally, when building an information system, the defense ability of the system is relatively weak if using either discrete logarithm or factorization theories alone. A blind signature scheme allows a person to sign an unknown message from others without knowing the disclosure of the content. It can be widely applied to secret electronic voting, anonymous digital cash systems, database security etc. In view of the high security and efficiency and the need of a mechanism of blind signature in the future informationalized society, it is definitely essential to work out a way to eliminate the negative factors developed while building the system. We follow the main idea mentioned above and provide a novel blind signature scheme.