Skip to main content
  • 629 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Brands S (1993) An efficient off-line electronic cash system based on the representation problem. Centrum voor Wiskunde en Informatica, Computer Science/Department of Algorithmics and Architecture, Report CS-R9323, http://www.cwi.nl/

  2. Brands S (1994) Untraceable off-line cash in wallet with observers. In: Stinson DR (ed) Advances in cryptology: CRYPTO’93. Lecture notes in computer science, vol 773, Springer, Berlin, pp 302–318

    Google Scholar 

  3. Brickell E, Gemmell P, Kravitz D (1995) Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In: Proceedings of the 6th ACM-SIAM symposium on discrete algorithms (SODA). ACM, New York, pp 457–466

    Google Scholar 

  4. Camenisch JL, Piveteau J-M, Stadler MA (1994) An efficient electronic payment system protecting privacy. In: Gollman D (ed) ESORICS’94 (Third European symposium on research in computer security), Brighton. Lecture notes in computer science, vol 875. Springer, Berlin, pp 207–215

    Google Scholar 

  5. Camenisch JL, Piveteau J-M, Stadler MA (1995) Blind signatures based on the discrete logarithm problem. In: De Santis A (ed) Advances in cryptology: EUROCRYPT’94. Lecture notes in computer science, vol 950. Springer, Berlin, pp 428–432

    Google Scholar 

  6. Camenisch JL, Piveteau J-M, Stadler MA (1996) An efficient fair payment system. In: 3rd ACM conference on computer and communications security, New Delhi, India, March 1996. ACM Press, New York, pp 88–94

    Google Scholar 

  7. Chaum D (1983) Blind signatures for untraceable payments. In: Chaum D, Rivest RL, Sherman AT (eds) Advances in cryptology: CRYPTO’82. Lecture notes in computer science. Plenum, New York, pp 199–203

    Google Scholar 

  8. Chaum D (1990) Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. In: Advances in cryptology: AUSCRYPT’90. Lecture notes in computer science, vol 453. Springer, Berlin, pp 246–264

    Google Scholar 

  9. Chaum D (1990) Online cash checks. In: Quisquatere J-J, Vandewalle J (eds) Advances in cryptology: EUROCRYPT’89. Lecture notes in computer science, vol 434. Springer, Berlin, pp 288–293

    Google Scholar 

  10. Chaum D, Fiat A, Naor M (1990) Untraceable electronic cash. In: Goldwasser S (ed) Advances in cryptology: CRYPTO’88. Lecture notes in computer science, vol 403. Springer, Berlin, pp 319–327

    Google Scholar 

  11. Chaum D, Pedersen TP (1993) Wallet databases with observers. In: Brickell EF (ed) Advances in cryptology: CRYPTO’92. Lecture notes in computer science, vol 740. Springer, Berlin, pp 89–105

    Google Scholar 

  12. Ferguson N (1994) Single term off-line coins. In: Helleseth T (ed) Advances in cryptology: EUROCRYPT’93. Lecture notes in computer science, vol 765. Springer, Berlin, pp 318–328

    Google Scholar 

  13. Ferguson N (1994) Extensions of single-term coins. In: Stinson DR (ed) Advances in cryptology: CRYPTO’93. Lecture notes in computer science, vol 773. Springer, Berlin, pp 292–301

    Google Scholar 

  14. Frankel Y, Tsiounis Y, Yung M (1996) Indirect discourse proofs: Achieving efficient fair off-line e-cash. In: Kim K, Matsumoto T (eds) Advances in cryptography: ASIACRYPT’96. Lecture notes in computer science, vol 1163. Springer, Berlin, pp 286–300

    Google Scholar 

  15. Franklin M, Yung M (1993) Secure and efficient off-line digital money. In: Lingas A, Karlsson RG, Carlsson S (eds) 20th International colloquium on automata, languages and programming (ICALP). Lecture notes in computer science, vol 700. Springer, Heidelberg, pp 265–276

    Google Scholar 

  16. Goldwasser S, Micali S, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2):281–308

    Article  MATH  MathSciNet  Google Scholar 

  17. Naccache D, von Solms S (1992) On blind signatures and perfect crimes. Comput Security 11(6):581–583

    Article  Google Scholar 

  18. Pfitzmann B, Sadeghi A-R (1999) Coin-based anonymous fingerprinting. In: Stern J (ed) Advances in cryptology: EUROCRYPT’99. Lecture notes in computer science, vol 1592. Springer, Berlin, pp 150–164

    Google Scholar 

  19. Pointcheval D (1998) Strengthened security for blind signatures. In: Nyberg K (ed) Advances in cryptology: EUROCRYPT’98. Lecture notes in computer science, vol 1403. Springer, Berlin, pp 391–405

    Google Scholar 

  20. Radu C, Govaerts R, Vandewalle J (1996) A restrictive blind signature scheme with applications to electronic cash. Communications and multimedia security II. Chapman & Hall, London, pp 196–207

    Google Scholar 

  21. Radu C, Govaerts R, Vandewalle J (1997) Efficient electronic cash with restricted privacy. In: Financial cryptography’97. Springer, Berlin, pp 57–69

    Google Scholar 

  22. Stadler M, Piveteau J-M, Camenisch JL (1995) Fair blind signatures. In: Guillou LC, Quisquater J-J (eds) Advances in cryptology: EUROCRYPT’95. Lecture notes in computer science, vol 921. Springer, Berlin, pp 209–219

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Bleumer, G. (2011). Blind Signature. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_181

Download citation

Publish with us

Policies and ethics