logo
    Flexible Multi-Authority Attribute-Based Signature Schemes for Expressive Policy
    5
    Citation
    41
    Reference
    10
    Related Paper
    Citation Trend
    Abstract:
    Attribute-based signature (ABS) is a new cryptographic primitive, in which a signer can sign a message with his attributes, and the verifier can only known whether the signer owns attributes satisfying his policy. Moreover, the signature cannot be forged by any user not having attributes satisfying the policy. ABS has many applications, such as anonymous authentication, and attribute-based messaging systems. But many applications may require a user obtaining attributes from different authorities, which calls for multi-authority ABS schemes.
    Keywords:
    Signature (topology)
    The electronic commerce security solution based on the digital signature technology could realize the confidentiality,integrity,authentication and non-repudiation of the information dissemination in electronic commerce system,and effectively prevent various potential security loopholes in electronic commerce. The thesis,form the fields of principle,function and implementation,describes the essence and application of digital signature technique in electronic business. And it also looks forward to the future of digital signature application in electronic commerce.
    Electronic signature
    Signature (topology)
    Non-repudiation
    Citations (0)
    The digital signature is a very important branch of the security of electronic commerce, the electronic commerce security solution based on the digital signature technology can realize the confidentiality, Integrity, authentication and non-Repudiation of the information dissemination in electronic commerce system, and can prevent effectively various potential security hazards in electronic commerce.
    Electronic signature
    Signature (topology)
    Non-repudiation
    Digital Signature Algorithm
    Citations (0)
    AbstractThe signatures in the real world represent and reveal the senders identity. They also bind the signer with the contents of message. Requirement of any signature system is two folded, first it represent a unique mark by creator of the document in a distinguished manner, secondly the recipient as well as third party may verify the ‘genuineness’ of the document. The authentication and verification of signed document in digital medium is far more complex then hand written signatures. Adoption of digital signature system addresses several issues like privacy, confidentiality and integrity of the document apart from authentication and verification of the document. For digital message system, a solution must be found to these problems simultaneously addressing the legal requirement as laid down in IT Act 2000. In this paper, we present the general model of cryptographic system and will show how public key cryptographic system serves the requirement of digital signature in the light of IT Act 2000. Additional informationNotes on contributorsD S YadavD S Yaday received MTech in Computer Science & Engineering from IIT, Kharagpur, BTech in Computer Engineering from G B Pant University of Agriculture and Technology, Pantnagar (UP). He is currently working as Assistant Professor Computer Science and Engineering at Institute of Engineering & Technology, Lucknow. Prior to this assignment, he served at G B Pant University of Agriculture & Technology, Pantnagar. He possesses more than ten years of teaching & industrial experience in Information Technology related areas. He is author of three book including “Foundations of Information Technology”. He has been conferred Young Scientist Award of UP Government in 2003. His research interest includes Active Databases, Distributed Computing and Real Time Systems.V S YadavV S Yadav was born in 1971 at Etah UP. He has obtained MSc (Electronics) from Agra University, Agra and PhD from Bundelkhand University, Jhansi. He is serving as Lecturer at Department of Applied Science at Bundelkhand Institute of Engineering & Technology, Jhansi. His area of interest are in Condensed matter and computer applications.R C SarswatR C Saraswat, FIETE passed BTech in Electrical Engineering from G B Pant University of Agriculture and Technology, Pantnagar (UP) in 1971, ME (Hons) in Electronics & Communication from University of Roorkee, Roorkee in 1976 and PhD in Electronics from Punjab University, Chandigarh. He worked as Senior Lecturer & Assistant Professor at GND College, Ludhiana from 1976–88. He worked as Professor in Electronics Engineering department at IET Lucknow from 1988–1999. Since October 1999, he is working as Director of Bundelkhand Institute of Engineering & Technology, Jhansi. He is a Fellow of IETE. His research activities include Active Network & VLSI design.
    Signature (topology)
    Recently, an interesting primary transmitter authentication scheme was proposed. The main idea of this scheme is to have the primary transmitter embed cryptographic authentication tag at the physical layer. There are a number of features that make this scheme attractive. In this paper, we investigate the effective coverage areas for the primary and secondary receivers before and after applying this scheme. During the process, we reveal a serious limitation of this scheme, which may prohibit its application in practice.
    Signature (topology)
    Key management plays a fundamental role in cryptography as the basis for securing cryptographic techniques providing confidentiality, entity authentication, data origin authentication, data integrity, and digital signatures. The goal of a good cryptographic design is to reduce more complex problems to the proper management and safe-keeping of a small number of cryptographic keys, ultimately secured through trust in hardware or software by physical isolation or procedural controls. Reliance on physical and procedural security (e.g., secured rooms with isolated equipment), tamper-resistant hardware, and trust in a large number of individuals is minimized by concentrating trust in a small number of easily monitored, controlled, and trustworthy elements.
    ABSTRACT Digital signatures are a restrained technique is used to validate the secrete document without any tampering. The hand-written signatures and Digital signature are both rely on the fact that it is very hard to find two signatures with the same person. Nowadays People use public-key cryptography to compute digital signatures by connecting something unique with another person's signature. Sometimes this digital signature called an electronic signature used for acknowledging online transactions. These signatures are commonly used for financial transactions, online transactions, software distribution, and in some common cases these signs are used for security purposes. The digital signatures are using different algorithms and procedures for cryptocurrency and other applications. This paper performs security analysis and the understanding of Digital Signature.
    Signature (topology)
    Electronic signature
    Financial cryptography
    Citations (0)
    Digital signature authentication scheme provides secure communication between two users. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). The focus Synopsis of this paper is to discuss how to protect communications that occur in a transaction so as to guide against fraudsters and in other cases where it is important to detect forgery or tampering.
    Communication source
    Signature (topology)
    Non-repudiation