• DocumentCode
    3750075
  • Title

    Applications of undeniable signature schemes

  • Author

    Kin-Woon Yeow;Syh-Yuan Tan;Swee-Huay Heng;Rouzbeh Behnia

  • Author_Institution
    Faculty of Information Science and Technology, Multimedia University, Jalan Ayer Keroh Lama, 75450 Melaka, Malaysia
  • fYear
    2015
  • Firstpage
    133
  • Lastpage
    138
  • Abstract
    Online applications such as e-auction, e-voting, and e-cash require common security properties such as integrity, unforgeability, confidentiality, non-repudiation, authentication, and anonymity. In this paper, besides identifying the security properties needed by these three applications, we also discuss the importance of access control. We show that undeniable signature schemes and its variants fulfil the security requirements and access control needed by the applications. We also propose a generic method to combine an undeniable signature scheme with a trapdoor function for constructing the applications mentioned above.
  • Keywords
    "Protocols","Electronic voting","Authentication","Access control","Digital signatures","Encryption"
  • Publisher
    ieee
  • Conference_Titel
    Signal and Image Processing Applications (ICSIPA), 2015 IEEE International Conference on
  • Type

    conf

  • DOI
    10.1109/ICSIPA.2015.7412177
  • Filename
    7412177