MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "abc19689-3db4-4a67-b1ea-d7ee8cf77908"}, "_deposit": {"id": "4198", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4198"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4198", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Proxy blind signature, which combines theproperties of both proxy signature and blind signature. Ina proxy blind signature scheme, the proxy signer isallowed to generate a blind signature on behalf of theoriginal signer. The proxy blind signature scheme isuseful in several applications such as e-voting, e-paymentand mobile agent environments. In this paper, we presentproxy blind signature scheme based on discrete logarithmproblem (DLP), which satisfy the security properties ofboth the blind signature scheme and the proxy signaturescheme. Analysis shows that our scheme is secure andefficient."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "blind signature"}, {"interim": "proxy signature"}, {"interim": "proxy blind signature"}, {"interim": "DLP"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "59001.pdf", "filesize": [{"value": "1742 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 1742000.0, "url": {"url": "https://meral.edu.mm/record/4198/files/59001.pdf"}, "version_id": "40c4dc7f-b77d-4582-9629-819484b0e0e7"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Oo, Aung Nway"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://ucsy.edu.mm/onlineresource/handle/123456789/1892"}, "item_title": "Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004198", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-06"}, "publish_date": "2019-08-06", "publish_status": "0", "recid": "4198", "relation": {}, "relation_version_is_last": true, "title": ["Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications"], "weko_shared_id": -1}
Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications
http://hdl.handle.net/20.500.12678/0000004198
http://hdl.handle.net/20.500.12678/0000004198afdffa6c-2817-42ef-9818-726d9213e511
abc19689-3db4-4a67-b1ea-d7ee8cf77908
Name / File | License | Actions |
---|---|---|
59001.pdf (1742 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications | |||||
Language | en | |||||
Publication date | 2009-12-30 | |||||
Authors | ||||||
Oo, Aung Nway | ||||||
Description | ||||||
Proxy blind signature, which combines theproperties of both proxy signature and blind signature. Ina proxy blind signature scheme, the proxy signer isallowed to generate a blind signature on behalf of theoriginal signer. The proxy blind signature scheme isuseful in several applications such as e-voting, e-paymentand mobile agent environments. In this paper, we presentproxy blind signature scheme based on discrete logarithmproblem (DLP), which satisfy the security properties ofboth the blind signature scheme and the proxy signaturescheme. Analysis shows that our scheme is secure andefficient. | ||||||
Keywords | ||||||
blind signature, proxy signature, proxy blind signature, DLP | ||||||
Identifier | http://ucsy.edu.mm/onlineresource/handle/123456789/1892 | |||||
Journal articles | ||||||
Fourth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |