Title
Applications of undeniable signature schemes
Abstract
Online applications such as e-auction, e-voting, and e-cash require common security properties such as integrity, unforgeability, confidentiality, non-repudiation, authentication, and anonymity. In this paper, besides identifying the security properties needed by these three applications, we also discuss the importance of access control. We show that undeniable signature schemes and its variants fulfil the security requirements and access control needed by the applications. We also propose a generic method to combine an undeniable signature scheme with a trapdoor function for constructing the applications mentioned above.
Year
DOI
Venue
2015
10.1109/ICSIPA.2015.7412177
2015 IEEE International Conference on Signal and Image Processing Applications (ICSIPA)
Keywords
Field
DocType
undeniable signature scheme applications,online applications,common security property identification,access control,generic method,trapdoor function
Computer access control,Authentication,Undeniable signature,Computer science,Computer security,Encryption,Digital signature,Trapdoor function,Access control,Anonymity
Conference
Citations 
PageRank 
References 
1
0.39
22
Authors
4
Name
Order
Citations
PageRank
Kin-Woon Yeow110.72
Syh-Yuan Tan23720.43
Swee-Huay Heng338447.50
Rouzbeh Behnia455.56