Extended electronic signature policies
Abstract
References
Recommendations
Breaking the short certificateless signature scheme
Certificateless cryptography eliminates the need of certificates in the Public Key Infrastructure and solves the inherent key escrow problem in the identity-based cryptography. Recently, Huang et al. proposed two certificateless signature schemes from ...
An optimistic fair exchange protocol based on signature policies
The growth of the e-commerce has allowed companies and individuals to sell and purchase almost any kind of product and service through the Internet. However, during the purchase transaction there is a moment during which the seller has sensitive ...
Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability
In this paper, we propose a new (t,n) threshold proxy signature scheme, in which at least t out of n proxy signers delegated by the original signer can sign messages on behalf of the original signer. The proposed scheme has the following main properties:...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Atilla Elçi,
- Oleg Makarevich,
- Mehmet Orgun,
- Program Chairs:
- Alexander Chefranov,
- Josef Pieprzyk,
- Yuri Anatolievich Bryukhomitsky,
- Sıddıka Berna Örs
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 264Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in