15 research outputs found
The Security Flaw of an Untraceable Signature Scheme
In 2003, Hwang et al. proposed a new blind signature based on the RSA cryptosystem. The Extended Euclidean algorithm is employed in their proposed scheme. They claimed that the proposed scheme was untraceable and it could meet all requirements of a blind signature. However, we find that the signer can still trace the blind signature applicant in some cases. Thus, we present the security flaw of Hwang et al.’s scheme in this paper
Classification of Signature-only Signature Models
We introduce a set of criterions for classifying signature-only
signature models. By the criterions, we classify signature models into 5 basic types and 69 general classes. Theoretically, 21140 kinds of signature models can be deduced by appropriately combining different general classes. The result comprises almost existing signature models. We also contribute a lot of new signature models. Moreover, we find the three signature models, i.e., group-nominee signature, multi-nominee signature and threshold-nominee
signature, are of great importance in light of our classification
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
Voting systems are the tool of choice when it comes to settle an agreement of different opinions. We propose a solution for a trustless, censorship-resilient and scalable electronic voting platform. By leveraging the blockchain together with the functional encryption paradigm, we fully decentralize the system and reduce the risks that a voting provider, like a corrupt government, does censor or manipulate the outcome
Blind Threshold Signatures Based on Discrete Logarithm
Blondel Georges. Général Niessel. — Le déséquilibre militaire. Paris, édit. A l’étoile. In: Revue internationale de l'enseignement, tome 91,1937. pp. 251-252