Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network

  Advanced Search  

Verifiable Encryption of Digital Signatures and Applications

Summary: Verifiable Encryption of Digital Signatures
and Applications
The Johns Hopkins University
This paper presents a new simple schemes for verifiable encryption of digital signatures. We make
use of a trusted third party (TTP) but in an optimistic sense, that is, the TTP takes part in the
protocol only if one user cheats or simply crashes. Our schemes can be used as primitives to build
efficient fair exchange and certified e-mail protocols.
Categories and Subject Descriptors: H.4.0 [Information Systems Applications]: General
Additional Key Words and Phrases: Certified e-mail, contract signing, digital signatures, fair ex-
change, public-key cryptography, proof of knowledge
Whenever a message is sent over the Internet, there is no assurance that it
will be delivered to the intended recipient. Even if the message has been deliv-
ered, the recipient may claim otherwise. This may be unpleasant particularly
in today's society where networked computers are increasingly being used to
exchange items between distrusted parties.
In the real world, some form of simultaneity can be achieved thanks to the
physical proximity of the parties involved with an exchange. For instance, two
parties can sign a contract simultaneously by holding the contract itself: One


Source: Ateniese, Giuseppe - Department of Computer Science, Johns Hopkins University


Collections: Computer Technologies and Information Sciences