Verifiable encryption of digital signatures and applications
From MaRDI portal
Publication:3546457
DOI10.1145/984334.984335zbMath1281.94069OpenAlexW2147178455WikidataQ114976187 ScholiaQ114976187MaRDI QIDQ3546457
Publication date: 21 December 2008
Published in: ACM Transactions on Information and System Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/984334.984335
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (5)
E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation ⋮ Fair exchange of valuable information: a generalised framework ⋮ Zero-knowledge argument for simultaneous discrete logarithms ⋮ Fair signature exchange via delegation on ubiquitous networks ⋮ Secure Obfuscation of Encrypted Verifiable Encrypted Signatures
This page was built for publication: Verifiable encryption of digital signatures and applications