{"created":"2020-09-01T14:20:02.196624+00:00","id":4198,"links":{},"metadata":{"_buckets":{"deposit":"abc19689-3db4-4a67-b1ea-d7ee8cf77908"},"_deposit":{"id":"4198","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4198"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4198","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Proxy blind signature, which combines theproperties of both proxy signature and blind signature. Ina proxy blind signature scheme, the proxy signer isallowed to generate a blind signature on behalf of theoriginal signer. The proxy blind signature scheme isuseful in several applications such as e-voting, e-paymentand mobile agent environments. In this paper, we presentproxy blind signature scheme based on discrete logarithmproblem (DLP), which satisfy the security properties ofboth the blind signature scheme and the proxy signaturescheme. Analysis shows that our scheme is secure andefficient."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"blind signature"},{"interim":"proxy signature"},{"interim":"proxy blind signature"},{"interim":"DLP"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-06"}],"displaytype":"preview","filename":"59001.pdf","filesize":[{"value":"1742 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4198/files/59001.pdf"},"version_id":"40c4dc7f-b77d-4582-9629-819484b0e0e7"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Oo, Aung Nway"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://ucsy.edu.mm/onlineresource/handle/123456789/1892"},"item_title":"Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-06","publish_status":"0","recid":"4198","relation_version_is_last":true,"title":["Proxy Blind Signature Scheme Applying for Privacy Awareness e-Applications"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:15:02.024713+00:00"}