MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "ac3ca4f6-86c5-4c49-a468-dfdc2724ba50"}, "_deposit": {"created_by": 45, "id": "6171", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "6171"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/6171", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In some applications, it is necessary to protect the privacy of the content of user from signer. Proxy blind signature can be used in these applications which combine the properties of both proxy signature and blind signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment and mobile agent environments. In this paper, firstly, we present proxy blind signature schemes based on discrete logarithm problem (DLP) and compare the complexity with previous scheme. Next, based on this DLP method, we present elliptic curve discrete logarithm problem (ECDLP) based proxy blind signature scheme. All of these satisfy the secure properties of both the blind signature scheme and the proxy signature scheme."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "blind signature"}, {"interim": "proxy signature"}, {"interim": "proxy blind signature"}, {"interim": "DLP"}, {"interim": "ECDLP"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-11-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem.pdf", "filesize": [{"value": "308 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 308000.0, "url": {"url": "https://meral.edu.mm/record/6171/files/Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem.pdf"}, "version_id": "20a1d872-768b-465f-a574-eeb151a2ec21"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICCA-2010", "subitem_c_date": "February, 2010", "subitem_conference_title": "International Conference on Computer Applications (ICCA-2010)", "subitem_place": "Yangon, Myanmar"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung Nway Oo"}, {"subitem_authors_fullname": "Ni Lar Thein"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-02-01"}, "item_title": "Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem", "item_type_id": "21", "owner": "45", "path": ["1596102355557"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000006171", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-11-14"}, "publish_date": "2020-11-14", "publish_status": "0", "recid": "6171", "relation": {}, "relation_version_is_last": true, "title": ["Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem"], "weko_shared_id": -1}
Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem
http://hdl.handle.net/20.500.12678/0000006171
http://hdl.handle.net/20.500.12678/0000006171a1b1a936-0ac3-4d3b-a88f-6b43c8e9a400
ac3ca4f6-86c5-4c49-a468-dfdc2724ba50
Name / File | License | Actions |
---|---|---|
![]() |
Publication type | ||||||
---|---|---|---|---|---|---|
Conference paper | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem | |||||
Language | en | |||||
Publication date | 2010-02-01 | |||||
Authors | ||||||
Aung Nway Oo | ||||||
Ni Lar Thein | ||||||
Description | ||||||
In some applications, it is necessary to protect the privacy of the content of user from signer. Proxy blind signature can be used in these applications which combine the properties of both proxy signature and blind signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment and mobile agent environments. In this paper, firstly, we present proxy blind signature schemes based on discrete logarithm problem (DLP) and compare the complexity with previous scheme. Next, based on this DLP method, we present elliptic curve discrete logarithm problem (ECDLP) based proxy blind signature scheme. All of these satisfy the secure properties of both the blind signature scheme and the proxy signature scheme. | ||||||
Keywords | ||||||
blind signature, proxy signature, proxy blind signature, DLP, ECDLP | ||||||
Conference papers | ||||||
ICCA-2010 | ||||||
February, 2010 | ||||||
International Conference on Computer Applications (ICCA-2010) | ||||||
Yangon, Myanmar |