An application of host identity tags to DKIM for identifying signers
Abstract
References
Index Terms
- An application of host identity tags to DKIM for identifying signers
Recommendations
On the Security of an Identity-Based Threshold Proxy Signature Scheme with Known Signers
ICNC '07: Proceedings of the Third International Conference on Natural Computation - Volume 03In TAMC'06, Bao et al. proposed a new identity-based threshold proxy signature with known signers from the bilinear pairings for the first time. In this paper, however, an attack is proposed to show that their scheme have serious security flaws. By this ...
Identity based identification from algebraic coding theory
Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based ...
Universal Designated Verifier Signatures with Threshold-Signers
IWSEC '09: Proceedings of the 4th International Workshop on Security: Advances in Information and Computer SecurityThe privacy and anonymity of a signer and the integrity and authenticity of a message are important. Generally, whenever the signer states the authenticity of a message (by producing a signature on that message), the privacy and anonymity of that signer ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Geuk Lee,
- Daniel Howard,
- Jeong Jin Kang,
- Program Chairs:
- Dominik Slezak,
- Tae Nam Ahn,
- Chung-Huang Yang
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 21Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in