HOME

TheInfoList



OR:

Signatures with efficient protocols are a form of
digital signature A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very high confidence that the message was created b ...
invented by Jan Camenisch and Anna Lysyanskaya in 2001. In addition to being secure digital signatures, they need to allow for the efficient implementation of two protocols: # A protocol for computing a digital signature in a secure two-party computation protocol. # A protocol for proving knowledge of a digital signature in a zero-knowledge protocol. In applications, the first protocol allows a signer to possess the signing key to issue a signature to a user (the signature owner) without learning all the messages being signed or the complete signature. The second protocol allows the signature owner to prove that he has a signature on many messages without revealing the signature and only a (possibly) empty subset of the messages. The combination of these two protocols allows for the implementation of digital credential and
ecash Ecash was conceived by David Chaum as an anonymous cryptographic electronic money or electronic cash system in 1983. It was realized through his corporation Digicash and used as micropayment system at one US bank from 1995 to 1998. Design Chaum pub ...
protocols.


See also

* Topics in cryptography


References


Further reading

* Jan Camenisch, Anna Lysyanskaya
A Signature Scheme with Efficient Protocols
SCN 2002: 268-289 * * * * {{cite journal , page=75 , journal = Informatica , date=March 1, 2012, volume=36, issue=1 , title=Times limited accountable anonymous online submission control system from single-verifier ''k''-times group signature , author=Zhao, Xingwen , author2=Zhang, Fangguo , access-date=October 11, 2012, url=http://www.informatica.si/PDF/36-1/12_Zhao%20-%20Times%20Limited%20Accountable%20Anonymous%20Online%20Submission%20Control%20System%20from.pdf , archive-url=https://web.archive.org/web/20120425113655/http://www.informatica.si/PDF/36-1/12_Zhao%20-%20Times%20Limited%20Accountable%20Anonymous%20Online%20Submission%20Control%20System%20from.pdf , archive-date=2012-04-25 Cryptography