Veriiable Escrowed Signature

نویسنده

  • Wenbo Mao
چکیده

We combine a publicly veriiable encryption technique and a Schnorr type signature scheme to achieve a veriiable escrowed signature scheme. The scheme allows a signer to convince a veriier the validity of a signature without letting him see the signature value. The unavailable but veriiable signature is encrypted under a public key of someone (e.g., a trusted third party) who stays oo-line. The technique will have useful applications in such as fair exchange of contracts between two untrusted parties without using on-line help of a commonly trusted third party, and fair escrow cryptosystems using oo-line escrow agents.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Escrow in Mutually Mistrusting Domains

In this paper we present a key escrow system which meets possible requirements for international key escrow, where diierent domains may not trust each other. In this system multiple third parties, who are trusted collectively but not individually, perform the dual role of providing users with key management services and providing autho-rised agencies in the relevant domains with warranted acces...

متن کامل

Identity Escrow

We introduce the concept of escrowed identity, an application of key-escrow ideas to the problem of authentication. In escrowed identity , one party A does not give his identity to another party B, but rather gives him information that would allow an authorized third party E to determine A's identity. However, B receives a guarantee that E can indeed determine A's identity. We consider a number...

متن کامل

Eecient Convertible Undeniable Signature Schemes

Undeniable signatures are digital signatures which are not universally veriiable but can only be checked with the signer's help. However, the signer cannot deny the validity of a correct signature. An extended concept , convertible undeniable signatures, allows the signer to convert single undeniable signatures or even the whole scheme into universally veriiable signatures or into an ordinary d...

متن کامل

An Interesting Member ID-based Group Signature

We propose an interesting efficient member ID-based group signatures, i.e., verification of output from algorithm OPEN run by the group manager does not have to refer to a registration table (acting as certification list). The proposal is free of GM-frameability, i.e., secret key of member is not escrowed to GM, which is unique among all known member ID-based group signatures as far as we know....

متن کامل

Publicly Veriiable Secret Sharing

A secret sharing scheme allows to share a secret among several participants such that only certain groups of them can recover it. Veriiable secret sharing has been proposed to achieve security against cheating participants. Its rst realization had the special property that everybody, not only the participants, can verify that the shares are correctly distributed. We will call such schemes publi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997