Privacy protecting protocols for revokable digital signatures

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Consider an application where a human user has to digitally sign a message. It is usually assumed that she has a trusted computer at her disposal, however, this assumption does not hold in several practical cases, especially if the user is mobile. Smart cards have been proposed to solve this problem, but they do not have a user interface, therefore the user still needs a (potentially untrusted) terminal to authorize the card to produce digital signatures. In order to mitigate this problem, we proposed a solution based on conditional signatures to provide a framework for the repudiation of unintended signatures. Our previous solution relies on a trusted third party who is able to link the issuer of the signature with the intended recipient, which may lead to severe privacy problems. In this paper we extend our framework and propose protocols that allow the user to retain her privacy with respect to this trusted third party. © 2004 Springer Science + Business Media, Inc.

Cite

CITATION STYLE

APA

Berta, I. Z., Buttyán, L., & Vajda, I. (2004). Privacy protecting protocols for revokable digital signatures. In IFIP Advances in Information and Communication Technology (Vol. 153, pp. 67–81). Springer New York LLC. https://doi.org/10.1007/1-4020-8147-2_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free