Information Security Practice and Experience

  • Hanzlik L
  • Kutyłowski M
  • Yung M
ISSN: 16113349
N/ACitations
Citations of this article
174Readers
Mendeley users who have this article in their library.

Abstract

We present a new concept for invalidating electronic signatures which, in many situations, seem to be better suited for real business and society applications. We do not rely on an administrative invalidation process executed separately for each single signing key and based on certificate revocation lists. Instead, all signatures created with a certain group are invalidated by a certain event. We propose a hard invalidation via releasing of the inherent cryptographic proof value–instead of soft invalidation via revoking certificates which leaves intact the cryptographic strength of signatures (even if legal validity is partially lost). We present concrete efficient realizations of our ideas based on verifiable encryption, trapdoor discrete logarithm groups and ring signatures.

Cite

CITATION STYLE

APA

Hanzlik, L., Kutyłowski, M., & Yung, M. (2015). Information Security Practice and Experience. Lecture Notes in Computer Science, 9065, 421–436. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84942540400&partnerID=tZOtx3y1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free