Secret signatures: How to achieve business privacy efficiently?

4Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Digital signatures provide authentication and non-repudiation in a public way in the sense that anyone can verify the validity of a digital signature using the corresponding public key. In this paper, we consider the issues of (1) signature privacy and (2) the corresponding public provability of signature. We propose a new digital signature variant, secret signature, which provides authentication and non-repudiation to the designated receiver only. If required, the correctness of the secret signature can be proven to the public either by the signer or the receiver. We conclude with a discussion to demonstrate the usefulness of the proposed cryptographic primitive (e.g., achieving signature privacy in an efficient manner). © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Lee, B., Choo, K. K. R., Yang, J., & Yoo, S. (2007). Secret signatures: How to achieve business privacy efficiently? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4867 LNCS, pp. 30–47). Springer Verlag. https://doi.org/10.1007/978-3-540-77535-5_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free