Electronic signature key storage

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

an analysis to credibility of signature in electronic commerce law

about electronic signatures there are more or less some writings concerning their legal aspect. but in those writings there has been a little attention to credibility and evidential value of the electronic signatures. some questions and ambiguities despite being set before has not been answered at all or answered unsatisfactorily. meanwhile, some authors have made mistakes and some have set tri...

متن کامل

Strong Key-Insulated Signature Schemes

Digital signing is at the heart of Internet based transactions and e-commerce. In this global communication environment, signature computation will be frequently performed on a relatively insecure device (e.g., a mobile phone) that cannot be trusted to completely (and at all times) maintain the secrecy of the private key. Loss of private keys has a devastating effect on digital signature scheme...

متن کامل

Electronic Signature and Digital Identity

Publisher UP GRADE is published on behalf of CEPIS (Council of European Professional Informatics Societies, ) by NOVÁTICA , journal of the Spanish CEPIS society ATI (Asociación de Técnicos de Informática ). UP GRADE is also published in Spanish (full issue printed, some articles online) by NOVÁTICA, and in Italian (abstract...

متن کامل

Key - Substitutable Signature and its Application to Certified Signature

The key substitution property is introduced by Blake-Wilson and Menezes [1] and formalized by Menezes and Smart [8] as attacks. The key substitution property is as follow: another person other than true signer can produce another public (and secret) key such that a message and signature pair created by the signer is valid under the public key. The research of the key substitution attacks [8, 6,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2018

ISSN: 1877-0509

DOI: 10.1016/j.procs.2018.11.010