{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:19:22Z","timestamp":1767183562688,"version":"3.37.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/ispacs62486.2024.10868418","type":"proceedings-article","created":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T18:19:40Z","timestamp":1739297980000},"page":"1-3","source":"Crossref","is-referenced-by-count":2,"title":["A Blind Signature Scheme Based on ElGamal Signature Scheme"],"prefix":"10.1109","author":[{"given":"Min-Shiang","family":"Hwang","sequence":"first","affiliation":[{"name":"Asia University,Fintech and Blockchain Research Center,Dept. of CS and IE,Taichung,Taiwan"}]},{"given":"Yung-Ling","family":"Chang","sequence":"additional","affiliation":[{"name":"Asia University,The Ph.D. Program in AI,Taichung,Taiwan"}]},{"given":"Chia-Chun","family":"Wu","sequence":"additional","affiliation":[{"name":"National Quemoy University,Dept. of IE and Management,Kinmen,Taiwan"}]},{"given":"Cheng-Ying","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Taipei,Dept. of Computer Science,Taipei,Taiwan"}]}],"member":"263","reference":[{"volume-title":"Introduction to Information and Network Security (in Chinese)","year":"2023","author":"Hwang","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/00207169908804781"},{"issue":"4","key":"ref3","first-page":"558","article-title":"A practical and efficient two-part edwards curve digital signature for mobile networks","volume":"23","author":"Zhang","year":"2021","journal-title":"International Journal of Network Security"},{"issue":"2","key":"ref4","first-page":"201","article-title":"A secure group signature scheme","volume":"20","author":"Tsai","year":"2018","journal-title":"International Journal of Network Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0096-3003(02)00500-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/00207160310001614954"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00312-2"},{"issue":"2","key":"ref8","first-page":"230","article-title":"Blockchain-based privacy-preserving electronic voting protocol","volume":"24","author":"Chai","year":"2022","journal-title":"International Journal of Network Security"},{"issue":"1","key":"ref9","first-page":"97","article-title":"An electronic voting scheme based on LUC secret system and secret sharing","volume":"23","author":"Pu","year":"2021","journal-title":"International Journal of Network Security"},{"issue":"6","key":"ref10","first-page":"997","article-title":"An electronic voting scheme using secure multiparty computation based on secret sharing","volume":"23","author":"Pu","year":"2021","journal-title":"International Journal of Network Security"},{"issue":"2","key":"ref11","first-page":"296","article-title":"Privacy-preserving and verifiable electronic voting scheme based on smart contract of blockchain","volume":"23","author":"Liu","year":"2021","journal-title":"International Journal of Network Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.93"},{"issue":"2","key":"ref13","first-page":"45","article-title":"Security enhancement of Chang-Lee anonymous e-voting scheme","volume":"6","author":"Li","year":"2012","journal-title":"International Journal of Smart Home"},{"issue":"1","key":"ref14","first-page":"9","article-title":"ECID: Elliptic curve identity-based blind signature scheme","volume":"23","author":"Yin","year":"2021","journal-title":"International Journal of Network Security"},{"issue":"5","key":"ref15","first-page":"867","article-title":"A blind signature-based location privacy protection scheme for mobile social networks","volume":"23","author":"Xu","year":"2021","journal-title":"International Journal of Network Security"},{"issue":"5","key":"ref16","first-page":"751","article-title":"A novel SVD and LWT based robust blind audio watermarking scheme","volume":"21","author":"Wu","year":"2019","journal-title":"International Journal of Network Security"},{"issue":"1","key":"ref17","first-page":"9","article-title":"Isogeny-based quantum-resistant undeniable blind signature scheme","volume":"20","author":"Seshadri Srinath","year":"2018","journal-title":"International Journal of Network Security"},{"issue":"6","key":"ref18","first-page":"1200","article-title":"A high-efficiency discrete logarithm-based multi-proxy blind signature scheme via elliptic curve and bilinear mapping","volume":"20","author":"Teng","year":"2018","journal-title":"International Journal of Network Security"},{"issue":"2","key":"ref19","first-page":"250","article-title":"A new robust blind copyright protection scheme based on visual cryptography and steerable pyramid","volume":"18","author":"El Arab El Hossaini","year":"2016","journal-title":"International Journal of Network Security"},{"issue":"2","key":"ref20","first-page":"217","article-title":"Provably secure partially blind signature scheme based on quadratic residue","volume":"17","author":"Zhao","year":"2015","journal-title":"International Journal of Network Security"},{"issue":"6","key":"ref21","first-page":"661","article-title":"Blind expressive ciphertext policy attribute based encryption for fine grained access control on the encrypted data","volume":"17","author":"Fu","year":"2015","journal-title":"International Journal of Network Security"},{"issue":"6","key":"ref22","first-page":"498","article-title":"Two simple attacks on a blind signature scheme","volume":"16","author":"Tian","year":"2014","journal-title":"International Journal of Network Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053458"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1049\/el:19950815"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/el:19951272"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.06.034"},{"key":"ref28","first-page":"209","article-title":"Fair bind signatures","author":"Stadler","year":"1995","journal-title":"Advences in Cryptology, EUROCRYPT\u201995"},{"issue":"2","key":"ref29","first-page":"513","article-title":"Traceability on Stadler et al.\u2019s fair blind signature scheme","volume":"E86-A","author":"Hwang","year":"2003","journal-title":"IEICE Transactions on Fundamentals on Electronics, Communications and Computer Sciences"},{"issue":"5","key":"ref30","first-page":"818","article-title":"Low-computation partially blind signatures for electronic cash","volume":"E81-A","author":"Fan","year":"1998","journal-title":"IEICE Transactions on Fundamentals"},{"issue":"5","key":"ref31","first-page":"1181","article-title":"Traceability on low-computation partially blind signatures for electronic cash","volume":"E85-A","author":"Hwang","year":"2002","journal-title":"IEICE Fundamentals on Electronics, Communications and Computer Sciences"},{"issue":"7","key":"ref32","first-page":"1902","article-title":"An untraceable blind signature scheme","volume":"E86-A","author":"Hwang","year":"2003","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"3-4","key":"ref33","first-page":"307","article-title":"Untraceable blind signature schemes based on discrete logarithm problem","volume":"55","author":"Lee","year":"2003","journal-title":"Fundamenta Informaticae"},{"issue":"3","key":"ref34","first-page":"58","article-title":"Blind signature scheme based on elliptic curve cryptography","volume":"34","author":"Tsai","year":"2004","journal-title":"Journal of Computer Society of India"}],"event":{"name":"2024 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","start":{"date-parts":[[2024,12,10]]},"location":"Kaohsiung, Taiwan","end":{"date-parts":[[2024,12,13]]}},"container-title":["2024 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10867836\/10865985\/10868418.pdf?arnumber=10868418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T06:42:46Z","timestamp":1739342566000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10868418\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ispacs62486.2024.10868418","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}