Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Brands S (1993) An efficient off-line electronic cash system based on the representation problem. Centrum voor Wiskunde en Informatica, Computer Science/Department of Algorithmics and Architecture, Report CS-R9323, http://www.cwi.nl/
Brands S (1994) Untraceable off-line cash in wallet with observers. In: Stinson DR (ed) Advances in cryptology: CRYPTO’93. Lecture notes in computer science, vol 773, Springer, Berlin, pp 302–318
Brickell E, Gemmell P, Kravitz D (1995) Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In: Proceedings of the 6th ACM-SIAM symposium on discrete algorithms (SODA). ACM, New York, pp 457–466
Camenisch JL, Piveteau J-M, Stadler MA (1994) An efficient electronic payment system protecting privacy. In: Gollman D (ed) ESORICS’94 (Third European symposium on research in computer security), Brighton. Lecture notes in computer science, vol 875. Springer, Berlin, pp 207–215
Camenisch JL, Piveteau J-M, Stadler MA (1995) Blind signatures based on the discrete logarithm problem. In: De Santis A (ed) Advances in cryptology: EUROCRYPT’94. Lecture notes in computer science, vol 950. Springer, Berlin, pp 428–432
Camenisch JL, Piveteau J-M, Stadler MA (1996) An efficient fair payment system. In: 3rd ACM conference on computer and communications security, New Delhi, India, March 1996. ACM Press, New York, pp 88–94
Chaum D (1983) Blind signatures for untraceable payments. In: Chaum D, Rivest RL, Sherman AT (eds) Advances in cryptology: CRYPTO’82. Lecture notes in computer science. Plenum, New York, pp 199–203
Chaum D (1990) Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. In: Advances in cryptology: AUSCRYPT’90. Lecture notes in computer science, vol 453. Springer, Berlin, pp 246–264
Chaum D (1990) Online cash checks. In: Quisquatere J-J, Vandewalle J (eds) Advances in cryptology: EUROCRYPT’89. Lecture notes in computer science, vol 434. Springer, Berlin, pp 288–293
Chaum D, Fiat A, Naor M (1990) Untraceable electronic cash. In: Goldwasser S (ed) Advances in cryptology: CRYPTO’88. Lecture notes in computer science, vol 403. Springer, Berlin, pp 319–327
Chaum D, Pedersen TP (1993) Wallet databases with observers. In: Brickell EF (ed) Advances in cryptology: CRYPTO’92. Lecture notes in computer science, vol 740. Springer, Berlin, pp 89–105
Ferguson N (1994) Single term off-line coins. In: Helleseth T (ed) Advances in cryptology: EUROCRYPT’93. Lecture notes in computer science, vol 765. Springer, Berlin, pp 318–328
Ferguson N (1994) Extensions of single-term coins. In: Stinson DR (ed) Advances in cryptology: CRYPTO’93. Lecture notes in computer science, vol 773. Springer, Berlin, pp 292–301
Frankel Y, Tsiounis Y, Yung M (1996) Indirect discourse proofs: Achieving efficient fair off-line e-cash. In: Kim K, Matsumoto T (eds) Advances in cryptography: ASIACRYPT’96. Lecture notes in computer science, vol 1163. Springer, Berlin, pp 286–300
Franklin M, Yung M (1993) Secure and efficient off-line digital money. In: Lingas A, Karlsson RG, Carlsson S (eds) 20th International colloquium on automata, languages and programming (ICALP). Lecture notes in computer science, vol 700. Springer, Heidelberg, pp 265–276
Goldwasser S, Micali S, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2):281–308
Naccache D, von Solms S (1992) On blind signatures and perfect crimes. Comput Security 11(6):581–583
Pfitzmann B, Sadeghi A-R (1999) Coin-based anonymous fingerprinting. In: Stern J (ed) Advances in cryptology: EUROCRYPT’99. Lecture notes in computer science, vol 1592. Springer, Berlin, pp 150–164
Pointcheval D (1998) Strengthened security for blind signatures. In: Nyberg K (ed) Advances in cryptology: EUROCRYPT’98. Lecture notes in computer science, vol 1403. Springer, Berlin, pp 391–405
Radu C, Govaerts R, Vandewalle J (1996) A restrictive blind signature scheme with applications to electronic cash. Communications and multimedia security II. Chapman & Hall, London, pp 196–207
Radu C, Govaerts R, Vandewalle J (1997) Efficient electronic cash with restricted privacy. In: Financial cryptography’97. Springer, Berlin, pp 57–69
Stadler M, Piveteau J-M, Camenisch JL (1995) Fair blind signatures. In: Guillou LC, Quisquater J-J (eds) Advances in cryptology: EUROCRYPT’95. Lecture notes in computer science, vol 921. Springer, Berlin, pp 209–219
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Bleumer, G. (2011). Blind Signature. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_181
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_181
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering