Designated confirmer signatures

This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whol...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Chaum, David
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 91
container_issue
container_start_page 86
container_title
container_volume
creator Chaum, David
description This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whole space of possibilities in between them. The technique works in essence by allowing the signer to prove to the signature's recipient that designated parties can confirm the signature without the signer. But the signer is protected, since unless sufficient designated parties cooperate in confirmation, the signature is no more convincing than any other number.
doi_str_mv 10.1007/BFb0053427
format Book Chapter
fullrecord <record><control><sourceid>springer</sourceid><recordid>TN_cdi_springer_books_10_1007_BFb0053427</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>springer_books_10_1007_BFb0053427</sourcerecordid><originalsourceid>FETCH-LOGICAL-s1397-14e561d1e081b0886e017693b5e2feec5174953f3a4f83b80d7730837fabc0fc3</originalsourceid><addsrcrecordid>eNpFj8tOwzAQRYeXRFq64Qfokk1gxmNn7CUUCkiV2MA6ipNxFR4JiuH_UVUkVle6VzpXB-Cc8IoQ5fp2HREdWyMHMGNn0VohMYdQUEVUMttwBIsgfrdVSFLhMRTIaMoglk9hlvMbIhoJpoCLO839dmi-tVu245D66VOn5b76mTSfwUlqPrIu_nIOr-v7l9VjuXl-eFrdbMpMHKQkq66ijhQ9RfS-0t1x4OjUJNXWkdjgOHFjk-fosRNh9CypiS2mludwuefmr6kftjrVcRzfc01Y76zrf2v-BSyoQyo</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype></control><display><type>book_chapter</type><title>Designated confirmer signatures</title><source>Springer Books</source><creator>Chaum, David</creator><contributor>De Santis, Alfredo</contributor><creatorcontrib>Chaum, David ; De Santis, Alfredo</creatorcontrib><description>This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whole space of possibilities in between them. The technique works in essence by allowing the signer to prove to the signature's recipient that designated parties can confirm the signature without the signer. But the signer is protected, since unless sufficient designated parties cooperate in confirmation, the signature is no more convincing than any other number.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540601760</identifier><identifier>ISBN: 3540601767</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540447172</identifier><identifier>EISBN: 9783540447177</identifier><identifier>DOI: 10.1007/BFb0053427</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Practical Protocol ; Signature Authentication ; Signature Scheme ; Signing Protocol ; Subsequent Confirmation</subject><ispartof>Advances in Cryptology — EUROCRYPT'94, 2006, p.86-91</ispartof><rights>Springer-Verlag Berlin Heidelberg 1995</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/BFb0053427$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/BFb0053427$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>777,778,782,791,27912,38242,41429,42498</link.rule.ids></links><search><contributor>De Santis, Alfredo</contributor><creatorcontrib>Chaum, David</creatorcontrib><title>Designated confirmer signatures</title><title>Advances in Cryptology — EUROCRYPT'94</title><description>This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whole space of possibilities in between them. The technique works in essence by allowing the signer to prove to the signature's recipient that designated parties can confirm the signature without the signer. But the signer is protected, since unless sufficient designated parties cooperate in confirmation, the signature is no more convincing than any other number.</description><subject>Practical Protocol</subject><subject>Signature Authentication</subject><subject>Signature Scheme</subject><subject>Signing Protocol</subject><subject>Subsequent Confirmation</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540601760</isbn><isbn>3540601767</isbn><isbn>3540447172</isbn><isbn>9783540447177</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2006</creationdate><recordtype>book_chapter</recordtype><sourceid/><recordid>eNpFj8tOwzAQRYeXRFq64Qfokk1gxmNn7CUUCkiV2MA6ipNxFR4JiuH_UVUkVle6VzpXB-Cc8IoQ5fp2HREdWyMHMGNn0VohMYdQUEVUMttwBIsgfrdVSFLhMRTIaMoglk9hlvMbIhoJpoCLO839dmi-tVu245D66VOn5b76mTSfwUlqPrIu_nIOr-v7l9VjuXl-eFrdbMpMHKQkq66ijhQ9RfS-0t1x4OjUJNXWkdjgOHFjk-fosRNh9CypiS2mludwuefmr6kftjrVcRzfc01Y76zrf2v-BSyoQyo</recordid><startdate>20060523</startdate><enddate>20060523</enddate><creator>Chaum, David</creator><general>Springer Berlin Heidelberg</general><scope/></search><sort><creationdate>20060523</creationdate><title>Designated confirmer signatures</title><author>Chaum, David</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-s1397-14e561d1e081b0886e017693b5e2feec5174953f3a4f83b80d7730837fabc0fc3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Practical Protocol</topic><topic>Signature Authentication</topic><topic>Signature Scheme</topic><topic>Signing Protocol</topic><topic>Subsequent Confirmation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chaum, David</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chaum, David</au><au>De Santis, Alfredo</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Designated confirmer signatures</atitle><btitle>Advances in Cryptology — EUROCRYPT'94</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2006-05-23</date><risdate>2006</risdate><spage>86</spage><epage>91</epage><pages>86-91</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540601760</isbn><isbn>3540601767</isbn><eisbn>3540447172</eisbn><eisbn>9783540447177</eisbn><abstract>This paper introduces a new kind of signature authentication and gives practical protocols that implement it. The technique can be used in ways that approach the functionality of known techniques, such as ordinary digital signatures and zero-knowledge proofs. But more importantly, it opens up a whole space of possibilities in between them. The technique works in essence by allowing the signer to prove to the signature's recipient that designated parties can confirm the signature without the signer. But the signer is protected, since unless sufficient designated parties cooperate in confirmation, the signature is no more convincing than any other number.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/BFb0053427</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Advances in Cryptology — EUROCRYPT'94, 2006, p.86-91
issn 0302-9743
1611-3349
language eng
recordid cdi_springer_books_10_1007_BFb0053427
source Springer Books
subjects Practical Protocol
Signature Authentication
Signature Scheme
Signing Protocol
Subsequent Confirmation
title Designated confirmer signatures
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T16%3A08%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-springer&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Designated%20confirmer%20signatures&rft.btitle=Advances%20in%20Cryptology%20%E2%80%94%20EUROCRYPT'94&rft.au=Chaum,%20David&rft.date=2006-05-23&rft.spage=86&rft.epage=91&rft.pages=86-91&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540601760&rft.isbn_list=3540601767&rft_id=info:doi/10.1007/BFb0053427&rft_dat=%3Cspringer%3Espringer_books_10_1007_BFb0053427%3C/springer%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540447172&rft.eisbn_list=9783540447177&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true