Abstract

Abstract In this article we review the ID Based Proxy-Blind signature scheme proposed by Zhang et al. and we give an attack on the scheme revealing the master secret key used in the construction of their scheme.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call