{"title":"一种具有双重保护的新型盲签名方案","authors":"J. Jen-Rong Chen, An-Pin Chen, R. Wen-Mao Lin","doi":"10.1109/CCST.2003.1297547","DOIUrl":null,"url":null,"abstract":"The basic theories for designing digital signatures are factorization or discrete logarithm. Generally, when building an information system, the defense ability of the system is relatively weak if using either discrete logarithm or factorization theories alone. A blind signature scheme allows a person to sign an unknown message from others without knowing the disclosure of the content. It can be widely applied to secret electronic voting, anonymous digital cash systems, database security etc. In view of the high security and efficiency and the need of a mechanism of blind signature in the future informationalized society, it is definitely essential to work out a way to eliminate the negative factors developed while building the system. We follow the main idea mentioned above and provide a novel blind signature scheme.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A novel blind signature scheme possessed with dual protections\",\"authors\":\"J. Jen-Rong Chen, An-Pin Chen, R. Wen-Mao Lin\",\"doi\":\"10.1109/CCST.2003.1297547\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The basic theories for designing digital signatures are factorization or discrete logarithm. Generally, when building an information system, the defense ability of the system is relatively weak if using either discrete logarithm or factorization theories alone. A blind signature scheme allows a person to sign an unknown message from others without knowing the disclosure of the content. It can be widely applied to secret electronic voting, anonymous digital cash systems, database security etc. In view of the high security and efficiency and the need of a mechanism of blind signature in the future informationalized society, it is definitely essential to work out a way to eliminate the negative factors developed while building the system. We follow the main idea mentioned above and provide a novel blind signature scheme.\",\"PeriodicalId\":344868,\"journal\":{\"name\":\"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2003.1297547\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2003.1297547","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel blind signature scheme possessed with dual protections
The basic theories for designing digital signatures are factorization or discrete logarithm. Generally, when building an information system, the defense ability of the system is relatively weak if using either discrete logarithm or factorization theories alone. A blind signature scheme allows a person to sign an unknown message from others without knowing the disclosure of the content. It can be widely applied to secret electronic voting, anonymous digital cash systems, database security etc. In view of the high security and efficiency and the need of a mechanism of blind signature in the future informationalized society, it is definitely essential to work out a way to eliminate the negative factors developed while building the system. We follow the main idea mentioned above and provide a novel blind signature scheme.