{"created":"2020-11-14T16:06:15.926710+00:00","id":6171,"links":{},"metadata":{"_buckets":{"deposit":"ac3ca4f6-86c5-4c49-a468-dfdc2724ba50"},"_deposit":{"created_by":45,"id":"6171","owner":"45","owners":[45],"owners_ext":{"displayname":"","email":"dimennyaung@uit.edu.mm","username":""},"pid":{"revision_id":0,"type":"recid","value":"6171"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/6171","sets":["1582963342780:1596102355557"]},"communities":["uit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"In some applications, it is necessary to protect the privacy of the content of user from signer. Proxy blind signature can be used in these applications which combine the properties of both proxy signature and blind signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment and mobile agent environments. In this paper, firstly, we present proxy blind signature schemes based on discrete logarithm problem (DLP) and compare the complexity with previous scheme. Next, based on this DLP method, we present elliptic curve discrete logarithm problem (ECDLP) based proxy blind signature scheme. All of these satisfy the secure properties of both the blind signature scheme and the proxy signature scheme."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"blind signature"},{"interim":"proxy signature"},{"interim":"proxy blind signature"},{"interim":"DLP"},{"interim":"ECDLP"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-11-14"}],"displaytype":"preview","filename":"Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem.pdf","filesize":[{"value":"308 Kb"}],"format":"application/pdf","licensetype":"license_0","url":{"url":"https://meral.edu.mm/record/6171/files/Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem.pdf"},"version_id":"20a1d872-768b-465f-a574-eeb151a2ec21"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"ICCA-2010","subitem_c_date":"February, 2010","subitem_conference_title":"International Conference on Computer Applications (ICCA-2010)","subitem_place":"Yangon, Myanmar"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung Nway Oo"},{"subitem_authors_fullname":"Ni Lar Thein"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-02-01"},"item_title":"Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem","item_type_id":"21","owner":"45","path":["1596102355557"],"publish_date":"2020-11-14","publish_status":"0","recid":"6171","relation_version_is_last":true,"title":["Proxy Blind Signature Scheme based on Discrete Logarithm Problem and Elliptic Curve Discrete Logarithm Problem"],"weko_creator_id":"45","weko_shared_id":-1},"updated":"2021-12-13T05:02:48.312448+00:00"}