The linearity of “check vectors” - a technique of secure distributed computation - gives an efficient solution to the problem of blind weak signatures (where a weak signature requires the on-line participation of a third party [IT]). We refine aspects of the notion of “blinding a signature,” and apply our weak schemes to on-line digital cash and other problems. The protocols we present are distinctly short, simple, and of low complexity.
CITATION STYLE
Franklin, M., & Yung, M. (1995). The blinding of weak signatures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 950, pp. 67–76). Springer Verlag. https://doi.org/10.1007/bfb0053425
Mendeley helps you to discover research relevant for your work.