Abstract
Abstract In this article we review the ID Based Proxy-Blind signature scheme proposed by Zhang et al. and we give an attack on the scheme revealing the master secret key used in the construction of their scheme.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have