{"created":"2020-09-01T15:14:41.820397+00:00","id":4660,"links":{},"metadata":{"_buckets":{"deposit":"b06b1ea5-1f90-4247-a21a-ddc109a3a339"},"_deposit":{"id":"4660","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4660"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4660","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Comparison of Elliptic Curve Key Size in Proposed Blind Signature","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Privacy is one of the basic rights forindividuals and institutions that need to preservetheir confidentiality. Blind signature is widelyused for various applications of e-commerce likedigital payment system and electronic votingsystem where to maintain the privacy ofcustomer is necessary. Most of the blindsignature schemes are very high atcomputational overhead and memory usageproblem. And then they need to maintain thesecurity of blind signature scheme to protect thedata. In this paper, four scalar multiplicationmethods are run in efficient blind signaturescheme by varying the NIST key size. By savingrandom factors and key size with suitable bitsthe system solved the memory usage problem.This paper showed that the comparison of keysize with other blind signatures schemes andanalyzed the security of proposed scheme.Compare with previous schemes, proposed blindsignature with 160 bit ECC is more efficient andlow computation and it can be applied in Evotingsystem."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"BDS"},{"interim":"DLP"},{"interim":"ECC"},{"interim":"NIST"},{"interim":"ECDLP"},{"interim":"ECM"},{"interim":"PKC"},{"interim":"E-voting"},{"interim":"E-cash"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"201641.pdf","filesize":[{"value":"152 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4660/files/201641.pdf"},"version_id":"eda6aeb9-4fa0-40b9-b986-2f0f53883c5d"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourteenth International Conference On Computer Applications (ICCA 2016)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thu, Aye Aye"},{"subitem_authors_fullname":"Mya, Khin Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2016-02-25"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/313"},"item_title":"Comparison of Elliptic Curve Key Size in Proposed Blind Signature","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"4660","relation_version_is_last":true,"title":["Comparison of Elliptic Curve Key Size in Proposed Blind Signature"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:23:59.158199+00:00"}