An attack on undeniable partially blind signatures
Blind signatures allow a user to get a signature on any message without revealing the content of the message to the signer. Partially blind signatures allow the signer to explicitly include common information in the blind signature under some agreement with the user. Undeniable signatures can only b...
| Main Authors: | Han, Song, Chang, Elizabeth, Wang, J. |
|---|---|
| Format: | Conference Paper |
| Published: |
Springer-Verlag
2005
|
| Subjects: | |
| Online Access: | http://www.springer.com http://hdl.handle.net/20.500.11937/5780 |
Similar Items
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
An efficient algorithm for exact computation of system and survival signatures using binary decision diagrams
by: Reed, Sean
Published: (2017)
by: Reed, Sean
Published: (2017)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Creativity in teaching: what can teachers learn from artists?
by: Hall, Christine, et al.
Published: (2016)
by: Hall, Christine, et al.
Published: (2016)
Genome-wide identification of signatures of positive selection in African admixed zebu cattle
by: Bahbahani, Hussain
Published: (2015)
by: Bahbahani, Hussain
Published: (2015)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
by: Wu, Shanglun, et al.
Published: (2021)
by: Wu, Shanglun, et al.
Published: (2021)
Signatures of selection and introgression in the genus Gallus
by: Lawal, Raman Akinyanju
Published: (2018)
by: Lawal, Raman Akinyanju
Published: (2018)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
Identification by PCR signature-tagged mutagenesis of attenuated Salmonella Pullorum mutants and corresponding genes in a chicken embryo model
by: Geng, Shizhong, et al.
Published: (2017)
by: Geng, Shizhong, et al.
Published: (2017)
Directional fractal signature analysis of trabecular bone: evaluation of different methods to detect early osteoarthritis in knee radiographs
by: Wolski, Marcin, et al.
Published: (2009)
by: Wolski, Marcin, et al.
Published: (2009)
‘Everyone can imagine their own Gellert’: the democratic artist and ‘inclusion’ in primary and nursery classrooms
by: Thomson, Pat, et al.
Published: (2015)
by: Thomson, Pat, et al.
Published: (2015)
A three-step classification framework to handle complex data distribution for radar UAV detection
by: Ren, Jianfeng, et al.
Published: (2020)
by: Ren, Jianfeng, et al.
Published: (2020)
Prevalence of blindness in children
by: Crewe, Julie, et al.
Published: (2012)
by: Crewe, Julie, et al.
Published: (2012)
Metabolic signature in stage A/B heart failure: A study in asymptomatic Type 2 Diabetes
by: Brady, Emer M.
Published: (2024)
by: Brady, Emer M.
Published: (2024)
Hospitalization rates of children who are blind
by: Crewe, Julie, et al.
Published: (2013)
by: Crewe, Julie, et al.
Published: (2013)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Low-dose salinomycin induces anti-leukemic responses in AML and MLL
by: Roulston, Gary D.R., et al.
Published: (2016)
by: Roulston, Gary D.R., et al.
Published: (2016)
In-process measurement and monitoring of a polymer laser sintering powder bed with fringe projection
by: Southon, Nicholas, et al.
Published: (2018)
by: Southon, Nicholas, et al.
Published: (2018)
An innovative reputation system for trustworthy and secure vehicle-to-vehicle communication
by: Almani, Dimah
Published: (2025)
by: Almani, Dimah
Published: (2025)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Design and implementation of a web-based replacement for the manual system of moderating exams
by: Oladokun, Adeola Asiat
Published: (2014)
by: Oladokun, Adeola Asiat
Published: (2014)
Improved multiple input multiple output blind equalization algorithms for medical implant communication
by: Lee, Zhi Hou
Published: (2015)
by: Lee, Zhi Hou
Published: (2015)
Ultrasonic echo reinforcement for the blind
by: Orlowski, Rafal John
Published: (1976)
by: Orlowski, Rafal John
Published: (1976)
Aquifers and ferric spring deposits south of Miri, Sarawak: impact on facies characterisation of coastal sediments
by: Kessler, L, et al.
Published: (2008)
by: Kessler, L, et al.
Published: (2008)
The Effectiveness Of Guiding Block For The Visually Disabled In Malioboro Street, Yogyakarta Indonesia
by: Hastuti, Mirna
Published: (2003)
by: Hastuti, Mirna
Published: (2003)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Similar Items
-
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006) -
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004) -
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005) -
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005) -
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)