Index Link

  • RootNode

Item

{"_buckets": {"deposit": "abc19689-3db4-4a67-b1ea-d7ee8cf77908"}, "_deposit": {"id": "4198", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4198"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4198", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Proxy blind signature, which combines theproperties of both proxy signature and blind signature. Ina proxy blind signature scheme, the proxy signer isallowed to generate a blind signature on behalf of theoriginal signer. The proxy blind signature scheme isuseful in several applications such as e-voting, e-paymentand mobile agent environments. In this paper, we presentproxy blind signature scheme based on discrete logarithmproblem (DLP), which satisfy the security properties ofboth the blind signature scheme and the proxy signaturescheme. Analysis shows that our scheme is secure andefficient."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "blind signature"}, {"interim": "proxy signature"}, {"interim": "proxy blind signature"}, {"interim": "DLP"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "59001.pdf", "filesize": [{"value": "1742 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 1742000.0, "url": {"url": "https://meral.edu.mm/record/4198/files/59001.pdf"}, "version_id": "40c4dc7f-b77d-4582-9629-819484b0e0e7"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Oo, Aung Nway"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://ucsy.edu.mm/onlineresource/handle/123456789/1892"}, "item_title": "Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004198", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-06"}, "publish_date": "2019-08-06", "publish_status": "0", "recid": "4198", "relation": {}, "relation_version_is_last": true, "title": ["Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications"], "weko_shared_id": -1}

Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications

http://hdl.handle.net/20.500.12678/0000004198
afdffa6c-2817-42ef-9818-726d9213e511
abc19689-3db4-4a67-b1ea-d7ee8cf77908
None
Name / File License Actions
59001.pdf 59001.pdf (1742 Kb)
Publication type
Article
Upload type
Publication
Title
Title Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications
Language en
Publication date 2009-12-30
Authors
Oo, Aung Nway
Description
Proxy blind signature, which combines theproperties of both proxy signature and blind signature. Ina proxy blind signature scheme, the proxy signer isallowed to generate a blind signature on behalf of theoriginal signer. The proxy blind signature scheme isuseful in several applications such as e-voting, e-paymentand mobile agent environments. In this paper, we presentproxy blind signature scheme based on discrete logarithmproblem (DLP), which satisfy the security properties ofboth the blind signature scheme and the proxy signaturescheme. Analysis shows that our scheme is secure andefficient.
Keywords
blind signature, proxy signature, proxy blind signature, DLP
Identifier http://ucsy.edu.mm/onlineresource/handle/123456789/1892
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats