Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Verifiable Encryption of Digital Signatures and Applications
 

Summary: Verifiable Encryption of Digital Signatures
and Applications
GIUSEPPE ATENIESE
The Johns Hopkins University
This paper presents a new simple schemes for verifiable encryption of digital signatures. We make
use of a trusted third party (TTP) but in an optimistic sense, that is, the TTP takes part in the
protocol only if one user cheats or simply crashes. Our schemes can be used as primitives to build
efficient fair exchange and certified e-mail protocols.
Categories and Subject Descriptors: H.4.0 [Information Systems Applications]: General
Additional Key Words and Phrases: Certified e-mail, contract signing, digital signatures, fair ex-
change, public-key cryptography, proof of knowledge
1. INTRODUCTION
Whenever a message is sent over the Internet, there is no assurance that it
will be delivered to the intended recipient. Even if the message has been deliv-
ered, the recipient may claim otherwise. This may be unpleasant particularly
in today's society where networked computers are increasingly being used to
exchange items between distrusted parties.
In the real world, some form of simultaneity can be achieved thanks to the
physical proximity of the parties involved with an exchange. For instance, two
parties can sign a contract simultaneously by holding the contract itself: One

  

Source: Ateniese, Giuseppe - Department of Computer Science, Johns Hopkins University

 

Collections: Computer Technologies and Information Sciences