Verifiable encryption of digital signatures and applications

Research output: Contribution to journalArticlepeer-review

85 Scopus citations

Abstract

This paper presents a new simple schemes for verifiable encryption of digital signatures. We make use of a trusted third party (TTP) but in an optimistic sense, that is, the TTP takes part in the protocol only if one user cheats or simply crashes. Our schemes can be used as primitives to build efficient fair exchange and certified e-mail protocols.

Original languageEnglish
Pages (from-to)1-20
Number of pages20
JournalACM Transactions on Information and System Security
Volume7
Issue number1
DOIs
StatePublished - Feb 2004

Keywords

  • Certified e-mail
  • Contract signing
  • Digital signatures
  • Fair exchange
  • Proof of knowledge
  • Public-key cryptography

Fingerprint

Dive into the research topics of 'Verifiable encryption of digital signatures and applications'. Together they form a unique fingerprint.

Cite this