Designated confirmer signatures
This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whol...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 91 |
---|---|
container_issue | |
container_start_page | 86 |
container_title | |
container_volume | |
creator | Chaum, David |
description | This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whole space of possibilities in between them.
The technique works in essence by allowing the signer to prove to the signature's recipient that designated parties can confirm the signature without the signer. But the signer is protected, since unless sufficient designated parties cooperate in confirmation, the signature is no more convincing than any other number. |
doi_str_mv | 10.1007/BFb0053427 |
format | Book Chapter |
fullrecord | <record><control><sourceid>springer</sourceid><recordid>TN_cdi_springer_books_10_1007_BFb0053427</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>springer_books_10_1007_BFb0053427</sourcerecordid><originalsourceid>FETCH-LOGICAL-s1397-14e561d1e081b0886e017693b5e2feec5174953f3a4f83b80d7730837fabc0fc3</originalsourceid><addsrcrecordid>eNpFj8tOwzAQRYeXRFq64Qfokk1gxmNn7CUUCkiV2MA6ipNxFR4JiuH_UVUkVle6VzpXB-Cc8IoQ5fp2HREdWyMHMGNn0VohMYdQUEVUMttwBIsgfrdVSFLhMRTIaMoglk9hlvMbIhoJpoCLO839dmi-tVu245D66VOn5b76mTSfwUlqPrIu_nIOr-v7l9VjuXl-eFrdbMpMHKQkq66ijhQ9RfS-0t1x4OjUJNXWkdjgOHFjk-fosRNh9CypiS2mludwuefmr6kftjrVcRzfc01Y76zrf2v-BSyoQyo</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype></control><display><type>book_chapter</type><title>Designated confirmer signatures</title><source>Springer Books</source><creator>Chaum, David</creator><contributor>De Santis, Alfredo</contributor><creatorcontrib>Chaum, David ; De Santis, Alfredo</creatorcontrib><description>This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whole space of possibilities in between them.
The technique works in essence by allowing the signer to prove to the signature's recipient that designated parties can confirm the signature without the signer. But the signer is protected, since unless sufficient designated parties cooperate in confirmation, the signature is no more convincing than any other number.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540601760</identifier><identifier>ISBN: 3540601767</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540447172</identifier><identifier>EISBN: 9783540447177</identifier><identifier>DOI: 10.1007/BFb0053427</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Practical Protocol ; Signature Authentication ; Signature Scheme ; Signing Protocol ; Subsequent Confirmation</subject><ispartof>Advances in Cryptology — EUROCRYPT'94, 2006, p.86-91</ispartof><rights>Springer-Verlag Berlin Heidelberg 1995</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/BFb0053427$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/BFb0053427$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>777,778,782,791,27912,38242,41429,42498</link.rule.ids></links><search><contributor>De Santis, Alfredo</contributor><creatorcontrib>Chaum, David</creatorcontrib><title>Designated confirmer signatures</title><title>Advances in Cryptology — EUROCRYPT'94</title><description>This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whole space of possibilities in between them.
The technique works in essence by allowing the signer to prove to the signature's recipient that designated parties can confirm the signature without the signer. But the signer is protected, since unless sufficient designated parties cooperate in confirmation, the signature is no more convincing than any other number.</description><subject>Practical Protocol</subject><subject>Signature Authentication</subject><subject>Signature Scheme</subject><subject>Signing Protocol</subject><subject>Subsequent Confirmation</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540601760</isbn><isbn>3540601767</isbn><isbn>3540447172</isbn><isbn>9783540447177</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2006</creationdate><recordtype>book_chapter</recordtype><sourceid/><recordid>eNpFj8tOwzAQRYeXRFq64Qfokk1gxmNn7CUUCkiV2MA6ipNxFR4JiuH_UVUkVle6VzpXB-Cc8IoQ5fp2HREdWyMHMGNn0VohMYdQUEVUMttwBIsgfrdVSFLhMRTIaMoglk9hlvMbIhoJpoCLO839dmi-tVu245D66VOn5b76mTSfwUlqPrIu_nIOr-v7l9VjuXl-eFrdbMpMHKQkq66ijhQ9RfS-0t1x4OjUJNXWkdjgOHFjk-fosRNh9CypiS2mludwuefmr6kftjrVcRzfc01Y76zrf2v-BSyoQyo</recordid><startdate>20060523</startdate><enddate>20060523</enddate><creator>Chaum, David</creator><general>Springer Berlin Heidelberg</general><scope/></search><sort><creationdate>20060523</creationdate><title>Designated confirmer signatures</title><author>Chaum, David</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-s1397-14e561d1e081b0886e017693b5e2feec5174953f3a4f83b80d7730837fabc0fc3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Practical Protocol</topic><topic>Signature Authentication</topic><topic>Signature Scheme</topic><topic>Signing Protocol</topic><topic>Subsequent Confirmation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chaum, David</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chaum, David</au><au>De Santis, Alfredo</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Designated confirmer signatures</atitle><btitle>Advances in Cryptology — EUROCRYPT'94</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2006-05-23</date><risdate>2006</risdate><spage>86</spage><epage>91</epage><pages>86-91</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540601760</isbn><isbn>3540601767</isbn><eisbn>3540447172</eisbn><eisbn>9783540447177</eisbn><abstract>This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whole space of possibilities in between them.
The technique works in essence by allowing the signer to prove to the signature's recipient that designated parties can confirm the signature without the signer. But the signer is protected, since unless sufficient designated parties cooperate in confirmation, the signature is no more convincing than any other number.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/BFb0053427</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Advances in Cryptology — EUROCRYPT'94, 2006, p.86-91 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_springer_books_10_1007_BFb0053427 |
source | Springer Books |
subjects | Practical Protocol Signature Authentication Signature Scheme Signing Protocol Subsequent Confirmation |
title | Designated confirmer signatures |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T16%3A08%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-springer&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Designated%20confirmer%20signatures&rft.btitle=Advances%20in%20Cryptology%20%E2%80%94%20EUROCRYPT'94&rft.au=Chaum,%20David&rft.date=2006-05-23&rft.spage=86&rft.epage=91&rft.pages=86-91&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540601760&rft.isbn_list=3540601767&rft_id=info:doi/10.1007/BFb0053427&rft_dat=%3Cspringer%3Espringer_books_10_1007_BFb0053427%3C/springer%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540447172&rft.eisbn_list=9783540447177&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |