Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2023_4_a1, author = {A. A. Babueva and L. R. Akhmetzyanova and E. K. Alekseev and O. G. Taraskin}, title = {On~blindness of several {ElGamal-type} blind signatures}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {13--20}, publisher = {mathdoc}, number = {4}, year = {2023}, language = {en}, url = {http://geodesic.mathdoc.fr/item/PDM_2023_4_a1/} }
TY - JOUR AU - A. A. Babueva AU - L. R. Akhmetzyanova AU - E. K. Alekseev AU - O. G. Taraskin TI - On~blindness of several ElGamal-type blind signatures JO - Prikladnaâ diskretnaâ matematika PY - 2023 SP - 13 EP - 20 IS - 4 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDM_2023_4_a1/ LA - en ID - PDM_2023_4_a1 ER -
A. A. Babueva; L. R. Akhmetzyanova; E. K. Alekseev; O. G. Taraskin. On~blindness of several ElGamal-type blind signatures. Prikladnaâ diskretnaâ matematika, no. 4 (2023), pp. 13-20. http://geodesic.mathdoc.fr/item/PDM_2023_4_a1/
[1] Chaum D., “Blind signatures for untraceable payments”, Advances in Cryptology, eds. D. Chaum, R. L. Rivest, and A. T. Sherman, Springer, Boston, MA, 1983, 199–203 | DOI | MR
[2] Gorbenko I., Yesina M., and Ponomar V., “Anonymous electronic signature method”, Third Intern. Conf. PIC S (Kharkiv, Ukraine, 2016), 47–50
[3] Rostovtsev A. G., “Blind signature on elliptic curve for e-cash”, Information Security Problems. Computer Systems, 2000, no. 1, 40–45 (in Russian) | MR
[4] Tan D. N., Nam H. N., Hieu M. N., and Van H. N., “New blind muti-signature schemes based on ECDLP”, IJECE, 8:2 (2018), 1074–1083 | DOI
[5] Juels A., Luby M., and Ostrovsky R., “Security of blind digital signatures”, LNCS, 1294, 1997, 150–164 | Zbl
[6] Pointcheval D. and Stern J., “Security arguments for digital signatures and blind signatures”, J. Cryptology, 13:3 (2000), 361–396 | DOI | Zbl
[7] Okamoto T., “Efficient blind and partially blind signatures without random oracles”, LNCS, 3876, 2006, 80–99 | MR | Zbl
[8] Hazay C., Katz J., Koo C. Y., and Lindell Y., “Concurrently-secure blind signatures without random oracles or setup assumptions”, LNCS, 4392, 2007, 323–341 | MR | Zbl
[9] Camenisch J., Neven G., and Shelat A., “Simulatable adaptive oblivious transfer”, LNCS, 4515, 2007, 573–590 | MR | Zbl
[10] Fischlin M. and Schroder D., “Security of blind signatures under aborts”, LNCS, 5443, 2009, 297–316 | MR | Zbl