The blinding of weak signatures

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

The linearity of “check vectors” - a technique of secure distributed computation - gives an efficient solution to the problem of blind weak signatures (where a weak signature requires the on-line participation of a third party [IT]). We refine aspects of the notion of “blinding a signature,” and apply our weak schemes to on-line digital cash and other problems. The protocols we present are distinctly short, simple, and of low complexity.

Cite

CITATION STYLE

APA

Franklin, M., & Yung, M. (1995). The blinding of weak signatures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 950, pp. 67–76). Springer Verlag. https://doi.org/10.1007/bfb0053425

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free