References
- Chaum, D., 'Blind Signatures for Untraceable Payments,' Advances in Cryptology CRYPTO'82;Lecture Notes in Computer Science, Springer-Verlag, pp. 199-203, 1983
- Chaum, D., 'Blind Signature System,' In D. Chaum editor, Advances in Cryptology - CRYPTO'83;Lecture Notes in Computer Science, Springer-Verlag, pp. 153-153, 1984
- Horster, P. and Petersen, H., 'Classfication of blind signature schemes and examples of hidden and weak blind signatures,' Presented at the Rump Session of Eurocrypt '94, Perugia, Italy, 6pages, 1994
- Abe, M. and Fujisaki, E., 'How to Date Blind Signatures,' Advances in Crytology Asiacrypt'96, Lecture Notes in Computer Science 1163, Springer Verlag, pp. 244-251, 1996 https://doi.org/10.1007/BFb0034851
- Chien, H.Y., Jan, J.K. and Tseng, Y.M., 'RSA-Based Partially Blind Signature with Low Computation,' Proceedings of the Eighth International Conference on Parallel and Distributed Systems, pp. 385-389, 2001 https://doi.org/10.1109/ICPADS.2001.934844
- Fan, C.I. and Lei, C.L., 'Low-computation partially blind signatures for electronic cash,' IEICE Trans. Fundamentals, Vol.E-81-A, No.5, pp.818-824, 1998
- National Institute of Standards and Technology, 'Digital signature standard (DSS),' Federal Information Processing Standards Publication FIPS PUB 186, U.S. Department of Commerce, May 1994
- Nyberg, K. and Rueppel, R., 'A new signature scheme based on the DSA giving message recovery,' Proc. 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, 4 pages, Nov. pp. 3-5, 1993 https://doi.org/10.1145/168588.168595
- Camenisch, J.L., Piveteau. J-M. and Stadler, M.A., 'Blind Signatures Based on the Discrete Logarithm Problem,' Proc. Eurocrypt'94, Springer Verlag, pp. 428-432, 1994 https://doi.org/10.1007/BFb0053458
- KCDSA Task Force Team., 'KCDSA : The Korean Certicate-based Digital Signature Algorithm,' Contribution to IEEE P1363a, August 1998
- 서문석,김광조, 'KCDSA 및 EC-KCDSA에 근간한 은닉 서명,' Conference on Information Security and Cryptology (CISC'99), Vol. 9, No.1, pp. 141-150, 1999
- ElGamal, T., 'A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms,' IEEE Transactions on Information Theory, Vol.31, No.4, pp. 469-472, Jul. 1985 https://doi.org/10.1109/TIT.1985.1057074
- Horster, P., Petersen, H. and Michels, M., 'Meta message recovery and meta blinded signature schemes based on the discrete logarithm problem and their applications,' Advances in Cryptology - Asiacrypt'94;Lecture Notes in Computer Science 1163, Springer Verlag, pp. 185-196, 1994 https://doi.org/10.1007/BFb0000437
- Horster, P., Michels. M. and Petersen, H., 'Efficient blind signature schemes based on the discrete logarithm problem,' Technical Report TR-94-6, University of Technology Chemnitz-Zwickau, 4 pages, Jun 1994
- Horster, P., Michels, M and Petersen, H., 'Meta-ElGamal signature schemes,' Proc. 2 ACM conference on Computer and Communications security, Fairfax, Virginia, 2-4, pp. 96-107, Nov. 1994
- Horster, P., Michels, M. and Petersen, H., 'Meta Message recovery and Meta Blind signature schemes based on the discrete lograrithm problem and their applications,' Advences in Cryptology - Asiacrypt '94, University of Wollongong, NSW, Australia, Nov. 28 - Dec. 1st, 12 pages, 1994 https://doi.org/10.1007/BFb0000437
- Schnorr, C.P., 'Efficient Identification and Signatures for Smart Cards,' In G. Brassard, editor, Advances in Cryptology - CRYPTO'89;Lecture Notes in Computer Science, Santa-Barbara, California, Springer Verlag, pp. 235-251, 1990
- Pointcheval, D. and Stern, J., 'Provably Secure Blind Signature scheme,' Advances in Crytology - Asiacrypt'96;Lecture Notes in Computer Science 1163, Springer Verlag, pp. 252-265, 1996
- Chen, C.Y., Chang, C.C. and Yang, W.P., 'Hybrid method for modular exponentiation with precomputation,' Electronics Letters, Vol.32, No.6, pp. 540-541, 1990 https://doi.org/10.1049/el:19960345
- Fan, C.I. and Lei, C.L., 'An Efficient Blind Signature Schemes Based on Quadratic Residues,' IEE Electronics Letters, Vol32, No.9, pp. 814-816, 1996 https://doi.org/10.1049/el:19960545
- Fan, C.I. and Lei, C.L., 'Low-Computation Blind Signature Schemes Based on Quadratic Residues,' IEE Electronics Letters, Vol.32, No.17, pp. 1569-1570, 1996 https://doi.org/10.1049/el:19961084
- Fan, C.I. and Lei, C.L., 'User efficient blind signatures,' Electronics Letters, Vol.34, No.6, pp. 544-546, 1998 https://doi.org/10.1049/el:19980378
- Menezes, A.J., Ooschot, P.C. and Vanstone, S.A., 'Handbook of Applied Cryptography,' Boca Raton, ISBN:0-8493-8523-7, pp. 74-75, 1997
- Shao, Z., 'Improved user efficient blind signatures,' Electronics Letters, Vol.36, No. 16, pp. 1372-1374, 2000 https://doi.org/10.1049/el:20001010
- Fan, C.I. and Lei, C.L., 'Cryptanalysis on improved user efficient blind signatures,' Electronics Letters, Vol.37, No.10, pp. 630-631, 2001 https://doi.org/10.1049/el:20010422
- Rivest, R.L., 'MD5 Message-Digest Algorithm,' IETF RFC 1321, Apr. 1992
- FIPS 180-1., 'Secure Hash Standard,' NIST.US Dept. of Commerce, 1995
- Desmedt, Y. and Odlyzko, A.M., 'A chosen text attack on the RSA cryptosystem and some discrete logarithms schemes,' Advances in Cryptology-Crypto'85 (H. C. Williams, ed.), Lecture Notes in Computer Science, Vol.218, Springer Verlag, pp. 516-521, 1986
- Rabin, M., 'Digitalized Signatures and Public-Key Functions as Intractable as Factorization,' MIT Technical Report, MIT/LCS/TR-212, 1979