Revised fischlin’s (blind) signature schemes

  • Authors:
  • Kewei Lv

  • Affiliations:
  • State Key Laboratory of Information Security, Graduate School of Chinese, Academy of Sciences, Beijing, China

  • Venue:
  • CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The representation problem based on factoring gives rise to alternative solutions to a lot of cryptographic protocols in the literature. Fischlin applies the problem to identification and (blind) signatures. Here we show some flaw of Fischlin’s schemes and present the revision.