Secure Signature ProtocolReport as inadecuate




Secure Signature Protocol - Download this document for free, or read online. Document in PDF available to download.

This paper studies how to take advantage of other-s computing ability to sign a message with one-s private key without disclosing the private key. A protocol to this problem is presented, and it is proven, by well known simulation paradigm, that this protocol is private.

KEYWORDS

cryptography, secure computation, signature, service, protocol

Cite this paper

S. LI, D. WANG and Y. DAI -Secure Signature Protocol,- Intelligent Information Management, Vol. 1 No. 3, 2009, pp. 174-179. doi: 10.4236-iim.2009.13026.





Author: Shundong LI, Daoshun WANG, Yiqi DAI

Source: http://www.scirp.org/



DOWNLOAD PDF




Related documents