Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Abstract— Online applications such as e-auction, e-voting, and e-cash require common security properties such as integrity, unforgeability, confidentiality ...
People also ask
Applications of undeniable signature schemes. Abstract: Online applications such as e-auction, e-voting, and e-cash require common security properties such as ...
An undeniable signature is a digital signature scheme which allows the signer to be selective to whom they allow to verify signatures. The scheme adds ...
Missing: Applications | Show results with:Applications
This paper shows that undeniable signature schemes and its variants fulfil the security requirements and access control needed by the applications and ...
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent ...
Applications. Undeniable signatures are useful for signers of nonpublic sensitive information who seek to keep control over who can verify their signatures.
Signature schemes are fundamental cryptographic primitives, useful as a stand-alone application, and as a building block in the design of secure protocols ...
Missing: undeniable | Show results with:undeniable
Undeniable signatures are well suited to such applications. An undeniable signature, like a digital signature, is a number issued by a signer that depends on.
Abstract. In undeniable signature schemes, zero-knowledgeness and non-transferability have been identified so far. In this paper, by sep-.
Nov 29, 2023 · Undeniable signature schemes have three operations: one for ... Now, what are the applications of undeniable signatures in the software industry?