Electronic signature key storage
نویسندگان
چکیده
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملan analysis to credibility of signature in electronic commerce law
about electronic signatures there are more or less some writings concerning their legal aspect. but in those writings there has been a little attention to credibility and evidential value of the electronic signatures. some questions and ambiguities despite being set before has not been answered at all or answered unsatisfactorily. meanwhile, some authors have made mistakes and some have set tri...
متن کاملStrong Key-Insulated Signature Schemes
Digital signing is at the heart of Internet based transactions and e-commerce. In this global communication environment, signature computation will be frequently performed on a relatively insecure device (e.g., a mobile phone) that cannot be trusted to completely (and at all times) maintain the secrecy of the private key. Loss of private keys has a devastating effect on digital signature scheme...
متن کاملElectronic Signature and Digital Identity
Publisher UP GRADE is published on behalf of CEPIS (Council of European Professional Informatics Societies, ) by NOVÁTICA , journal of the Spanish CEPIS society ATI (Asociación de Técnicos de Informática ). UP GRADE is also published in Spanish (full issue printed, some articles online) by NOVÁTICA, and in Italian (abstract...
متن کاملKey - Substitutable Signature and its Application to Certified Signature
The key substitution property is introduced by Blake-Wilson and Menezes [1] and formalized by Menezes and Smart [8] as attacks. The key substitution property is as follow: another person other than true signer can produce another public (and secret) key such that a message and signature pair created by the signer is valid under the public key. The research of the key substitution attacks [8, 6,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2018
ISSN: 1877-0509
DOI: 10.1016/j.procs.2018.11.010