Abstract | ||
---|---|---|
Online applications such as e-auction, e-voting, and e-cash require common security properties such as integrity, unforgeability, confidentiality, non-repudiation, authentication, and anonymity. In this paper, besides identifying the security properties needed by these three applications, we also discuss the importance of access control. We show that undeniable signature schemes and its variants fulfil the security requirements and access control needed by the applications. We also propose a generic method to combine an undeniable signature scheme with a trapdoor function for constructing the applications mentioned above. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/ICSIPA.2015.7412177 | 2015 IEEE International Conference on Signal and Image Processing Applications (ICSIPA) |
Keywords | Field | DocType |
undeniable signature scheme applications,online applications,common security property identification,access control,generic method,trapdoor function | Computer access control,Authentication,Undeniable signature,Computer science,Computer security,Encryption,Digital signature,Trapdoor function,Access control,Anonymity | Conference |
Citations | PageRank | References |
1 | 0.39 | 22 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kin-Woon Yeow | 1 | 1 | 0.72 |
Syh-Yuan Tan | 2 | 37 | 20.43 |
Swee-Huay Heng | 3 | 384 | 47.50 |
Rouzbeh Behnia | 4 | 5 | 5.56 |