tailieunhanh - Blind Signature Protocols from Digital Signature Standards

Using Russian digital signature (DS) standards as the underlying scheme there are designed the blind DS protocols that are the first known implementation of the blind DS based on signature standards. There are also proposed blind collective DS protocols based on the DS standards. | International Journal of Network Security PP. 22-30 July 2011 22 Blind Signature Protocols from Digital Signature Standards Nikolay A. Moldovyan St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences 14 Liniya 39 St. Petersburg 199178 Russia Email nmold@ Received Aug. 3 2009 revised and accepted May 17 July 12 2010 Abstract Using Russian digital signature DS standards as the underlying scheme there are designed the blind DS protocols that are the first known implementation of the blind DS based on signature standards. There are also proposed blind collective DS protocols based on the DS standards. The last protocols are also the first implementation of the blind multi-signature schemes using the signature verification equations specified by DS standards. Keywords Blind collective signature blind signature collective digital signature digital signature standard 1 Introduction The digital signature DS protocols are widely used in information systems to solve different practical problems of the messages authentication. A variety of the DS protocols has been proposed in the literature 4 9 19 including multi-signature schemes 1 7 17 . A particular type of the protocols called blind signature schemes 2 are especially interesting for application in the electronic money systems and in the electronic voting systems. The properties of the blind signatures are 17 1 The signer can not to read the document during process of signature generation 2 The signer can not correlate the signed document with the act of signing. The first property is provided by variety of DS algorithms in which the signature generation procedure uses the hash function value computed from the document to be signed. Actually some user U is able to compute the hash value and to keep the document in secret. Then he can submit the document for signing and get the DS relating to the document. However the second property is not satisfied with this mechanism .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.