{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:02:43Z","timestamp":1757455363390,"version":"3.37.3"},"reference-count":26,"publisher":"Oxford University Press (OUP)","issue":"10","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772224","62172181","62072133"],"award-info":[{"award-number":["61772224","62172181","62072133"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20465","61922045","U1836115"],"award-info":[{"award-number":["U21A20465","61922045","U1836115"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Projects of Guangxi Natural Science Foundation","award":["2018GXNSFDA281040"],"award-info":[{"award-number":["2018GXNSFDA281040"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,15]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>In this paper, we propose a new cryptographic primitive, called multiple blind signature (MBS), which is designed based on the integration of both normal blind signature scheme and dual signature. The major difference between a normal blind signature and an MBS is that using a normal blind signature, only one message, $m$, can be verified, but using an MBS, any subset, ${M}^{\\prime }$, of multiple messages in a set, $M$, where ${M}^{\\prime}{\\subseteq} M$, can be verified. With this additional property, we will show that MBS is especially suitable for e-voting and e-cash applications. In other words, we classify these processes in two applications into two phases, on-line and off-line phases. One unique property of this design is that most time-consuming computation and interaction can be performed in advance in off-line phase. There is no cost of computation and interaction in the online phase.<\/jats:p>","DOI":"10.1093\/comjnl\/bxac079","type":"journal-article","created":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T13:11:25Z","timestamp":1656421885000},"page":"2331-2338","source":"Crossref","is-referenced-by-count":5,"title":["Multiple Blind Signature for e-Voting and e-Cash"],"prefix":"10.1093","volume":"66","author":[{"given":"Lein","family":"Harn","sequence":"first","affiliation":[{"name":"Department of Computer Science Electrical Engineering, University of Missouri-Kansas City , Kansas City, MO 64110 , USA"}]},{"given":"Chingfang","family":"Hsu","sequence":"additional","affiliation":[{"name":"Computer School, Central China Normal University , Wuhan 430079 , China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4397-1248","authenticated-orcid":false,"given":"Zhe","family":"Xia","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Wuhan University of Technology , Wuhan 430071 , China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1472-4272","authenticated-orcid":false,"given":"Zixuan","family":"Li","sequence":"additional","affiliation":[{"name":"Wuhan Britain-China School , Wuhan 430022 , China"}]}],"member":"286","published-online":{"date-parts":[[2022,6,26]]},"reference":[{"key":"2023101421205661900_ref1","article-title":"A privacy-preserving and untraceable group data sharing scheme","author":"Shen","year":"2021","journal-title":"IEEE Trans. Depend. Secure Comput"},{"key":"2023101421205661900_ref2","article-title":"Lightweight and certificateless multi-receiver secure data transmission protocol for wireless body area networks","author":"Shen","year":"2020","journal-title":"IEEE Trans. Depend. Secure Comput"},{"key":"2023101421205661900_ref3","doi-asserted-by":"crossref","first-page":"14287","DOI":"10.1109\/JIOT.2021.3068364","article-title":"Efficient certificateless online\/offline signature scheme for wireless body area networks","volume":"18","author":"Peng","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"2023101421205661900_ref4","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/TDSC.2017.2725953","article-title":"Block design-based key agreement for group data sharing in cloud computing","volume":"16","author":"Shen","year":"2019","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"2023101421205661900_ref5","first-page":"177","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 88, Lecture Notes in Computer Science 330","author":"Chaum","year":"1988"},{"volume-title":"International Workshop on the Theory and Application of Cryptographic Techniques","year":"1992","author":"Fujioka","key":"2023101421205661900_ref6"},{"key":"2023101421205661900_ref7","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"","year":"1981","journal-title":"Commun. ACM"},{"key":"2023101421205661900_ref8","first-page":"440","volume-title":"ICICS98, Lecture Notes in Computer Science 1334","author":"","year":"1998"},{"key":"2023101421205661900_ref9","first-page":"437","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 98, Lecture Notes in Computer Science 1403","author":"","year":"1998"},{"key":"2023101421205661900_ref10","first-page":"372","volume-title":"26th Annual Symposium on Foundations of Computer Science","author":"","year":"1985"},{"key":"2023101421205661900_ref11","first-page":"103","volume-title":"Advances in Cryptology \u2014 EURO-CRYPT\u2019 97, Lecture Notes in Computer Science 1233","author":"","year":"1997"},{"key":"2023101421205661900_ref12","first-page":"199","article-title":"Blind signatures for untraceable payments","volume":"82","author":"","year":"1983","journal-title":"Adv. Cryptol. Proc. Crypto."},{"key":"2023101421205661900_ref13","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.ins.2020.05.092","article-title":"Adaptively secure certificate-based broadcast encryption and its application to cloud storage service","volume":"538","author":"Chen","year":"2020","journal-title":"Inform. Sci."},{"key":"2023101421205661900_ref14","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1109\/TBC.2020.2984974","article-title":"Anonymous certificate-based broadcast encryption with personalized messages","volume":"66","author":"Chen","year":"2020","journal-title":"IEEE Trans. Broadcast."},{"key":"2023101421205661900_ref15","first-page":"110","article-title":"Anonymous certificate-based broadcast encryption with constant decryption cost","volume":"454","author":"Li","year":"2018","journal-title":"Inform. Sci."},{"key":"2023101421205661900_ref16","article-title":"Efficient attribute based server-aided verification signature","author":"Chen","year":"2021","journal-title":"IEEE Trans. Service Comput."},{"volume-title":"Mastercard and Visa","year":"1997","author":"SET Secure Electronic Transaction Specification (V1.0) Book 2 (PDF)","key":"2023101421205661900_ref17"},{"volume-title":"A Description of the RC2 (r) Encryption Algorithm March","year":"1998","author":"Rivest","key":"2023101421205661900_ref18"},{"key":"2023101421205661900_ref19","doi-asserted-by":"crossref","first-page":"34165","DOI":"10.1109\/ACCESS.2021.3061411","article-title":"On the design and implementation of a blockchain enabled E-voting application within IoT-oriented smart cities","volume":"9","author":"Rathee","year":"2021","journal-title":"IEEE Access"},{"key":"2023101421205661900_ref20","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1109\/TNSE.2020.3011928","article-title":"A blockchain-based traceable self-tallying E-voting protocol in AI era","volume":"8","author":"Li","year":"2021","journal-title":"IEEE Transac. Netw. Sci. Eng."},{"key":"2023101421205661900_ref21","doi-asserted-by":"crossref","first-page":"16585","DOI":"10.1109\/JIOT.2021.3074877","article-title":"d-BAME: distributed blockchain-based anonymous mobile electronic voting","volume":"8","author":"Zaghloul","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"2023101421205661900_ref22","article-title":"Almost everyone involved in developing tor, was (or is) funded by the US government","author":"Levine","year":"2014","journal-title":"Pando Daily"},{"key":"2023101421205661900_ref23","first-page":"401","volume-title":"Proceedings of ICN 2011: The Tenth International Conference on Networks","author":"Zantour","year":"2011"},{"volume-title":"Open HUB","author":"Tor","key":"2023101421205661900_ref24"},{"key":"2023101421205661900_ref25","doi-asserted-by":"crossref","DOI":"10.1109\/LSENS.2021.3108076","article-title":"Mix broadcast network with user untraceability for resource-constrained IoT","volume":"5","author":"Harn","year":"2021","journal-title":"IEEE Sensors Lett."},{"first-page":"552","volume-title":"ASIACRYPT 2001, Volume 2248 of Lecture Notes in Computer Science","author":"","key":"2023101421205661900_ref26"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/66\/10\/2331\/52134594\/bxac079.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/66\/10\/2331\/52134594\/bxac079.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T21:21:22Z","timestamp":1697318482000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/66\/10\/2331\/6618068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":26,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2022,6,26]]},"published-print":{"date-parts":[[2023,10,15]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxac079","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2023,10]]},"published":{"date-parts":[[2022,6,26]]}}}