Return to Article Details Cloning attack on a Proxy Blind Signature Scheme over Braid Groups Download Download PDF