Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "abc19689-3db4-4a67-b1ea-d7ee8cf77908"}, "_deposit": {"id": "4198", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4198"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4198", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Proxy blind signature, which combines theproperties of both proxy signature and blind signature. Ina proxy blind signature scheme, the proxy signer isallowed to generate a blind signature on behalf of theoriginal signer. The proxy blind signature scheme isuseful in several applications such as e-voting, e-paymentand mobile agent environments. In this paper, we presentproxy blind signature scheme based on discrete logarithmproblem (DLP), which satisfy the security properties ofboth the blind signature scheme and the proxy signaturescheme. Analysis shows that our scheme is secure andefficient."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "blind signature"}, {"interim": "proxy signature"}, {"interim": "proxy blind signature"}, {"interim": "DLP"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "59001.pdf", "filesize": [{"value": "1742 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 1742000.0, "url": {"url": "https://meral.edu.mm/record/4198/files/59001.pdf"}, "version_id": "40c4dc7f-b77d-4582-9629-819484b0e0e7"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Oo, Aung Nway"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://ucsy.edu.mm/onlineresource/handle/123456789/1892"}, "item_title": "Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004198", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-06"}, "publish_date": "2019-08-06", "publish_status": "0", "recid": "4198", "relation": {}, "relation_version_is_last": true, "title": ["Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications

http://hdl.handle.net/20.500.12678/0000004198
http://hdl.handle.net/20.500.12678/0000004198
afdffa6c-2817-42ef-9818-726d9213e511
abc19689-3db4-4a67-b1ea-d7ee8cf77908
None
Preview
Name / File License Actions
59001.pdf 59001.pdf (1742 Kb)
Publication type
Article
Upload type
Publication
Title
Title Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications
Language en
Publication date 2009-12-30
Authors
Oo, Aung Nway
Description
Proxy blind signature, which combines theproperties of both proxy signature and blind signature. Ina proxy blind signature scheme, the proxy signer isallowed to generate a blind signature on behalf of theoriginal signer. The proxy blind signature scheme isuseful in several applications such as e-voting, e-paymentand mobile agent environments. In this paper, we presentproxy blind signature scheme based on discrete logarithmproblem (DLP), which satisfy the security properties ofboth the blind signature scheme and the proxy signaturescheme. Analysis shows that our scheme is secure andefficient.
Keywords
blind signature, proxy signature, proxy blind signature, DLP
Identifier http://ucsy.edu.mm/onlineresource/handle/123456789/1892
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:20:02.991988
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL