Citation
Yeow, Kin Woon and Tan, Syh Yuan and Heng, Swee Huay and Behnia, Rouzbeh (2016) Applications of undeniable signature schemes. In: 2015 IEEE International Conference on Signal and Image Processing Applications (ICSIPA). IEEE, pp. 133-138. ISBN 978-1-4799-8996-6
Text
73.pdf Restricted to Repository staff only Download (213kB) |
Official URL: http://doi.org/10.1109/ICSIPA.2015.7412177
Abstract
Online applications such as e-auction, e-voting, and e-cash require common security properties such as integrity, unforgeability, confidentiality, non-repudiation, authentication, and anonymity. In this paper, besides identifying the security properties needed by these three applications, we also discuss the importance of access control. We show that undeniable signature schemes and its variants fulfil the security requirements and access control needed by the applications. We also propose a generic method to combine an undeniable signature scheme with a trapdoor function for constructing the applications mentioned above.
Item Type: | Book Section |
---|---|
Uncontrolled Keywords: | Protocols, Electronic voting, Authentication, Access control, Digital signatures, Encryption |
Subjects: | Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science |
Divisions: | Faculty of Information Science and Technology (FIST) |
Depositing User: | Ms Rosnani Abd Wahab |
Date Deposited: | 07 Dec 2017 14:23 |
Last Modified: | 07 Dec 2017 14:23 |
URII: | http://shdl.mmu.edu.my/id/eprint/6582 |
Downloads
Downloads per month over past year
Edit (login required) |