Pseudonymous Signature Schemes

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The schemes aim to provide a strong cryptographic evidence of integrity of the signed data and origin of the signature, but at the same time have to hide the identity of the signatory. There are two crucial properties that are specific for pseudonymous signatures: ability to recover the real identity of the signatory in certain circumstances and resilience to Sybil attacks. Despite using a single private key, the signatory can create a (single) unlinkable pseudonym for each domain or sector of activity and generate signatures corresponding to this pseudonym.

Cite

CITATION STYLE

APA

Bláskiewicz, P., Hanzlik, L., Kluczniak, K., Krzywiecki, L., Kutylowski, M., Slowik, M., & Wszola, M. (2018). Pseudonymous Signature Schemes. In Advances in Cyber Security: Principles, Techniques, and Applications (pp. 185–255). Springer Singapore. https://doi.org/10.1007/978-981-13-1483-4_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free