Secure Signature Protocol

HTML  Download Download as PDF (Size: 214KB)  PP. 174-179  
DOI: 10.4236/iim.2009.13026    5,297 Downloads   8,153 Views  

Affiliation(s)

.

ABSTRACT

This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is proven, by well known simulation paradigm, that this protocol is private.

Share and Cite:

S. LI, D. WANG and Y. DAI, "Secure Signature Protocol," Intelligent Information Management, Vol. 1 No. 3, 2009, pp. 174-179. doi: 10.4236/iim.2009.13026.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.