DSA-based verifiable and recoverable encryption of signatures and its application in certified e-goods delivery

被引:3
|
作者
Nenadic, A [1 ]
Zhang, N [1 ]
Shi, Q [1 ]
Goble, C [1 ]
机构
[1] Univ Manchester, Sch Comp Sci, Manchester M13 9PL, Lancs, England
关键词
D O I
10.1109/EEE.2005.62
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new method for Verifiable and Recoverable Encryption of DSA signatures, and apply this cryptographic primitive in the design of a novel certified e-goods delivery (DSA-CEGD) protocol. The DSA-CEGD protocol has the following features: (1) ensures strong fairness, (2) ensures non-repudiation of origin and non-repudiation of receipt, (3) allows the receiver of an e-goods to verify, during the protocol execution, that the e-goods he is about to receive is the one he is signing the receipt for, (4) does not require the on-line involvement of a fully trusted third party (TTP), but rather an off-line and transparent semi-trusted third party (STTP), and (5) provides the confidentiality protection for the exchanged items from the STTP.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 7 条
  • [1] RSA-based certified delivery of e-goods using verifiable and recoverable signature encryption
    Nenadic, A
    Zhang, N
    Cheetham, B
    Goble, C
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2005, 11 (01) : 175 - 192
  • [2] RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery
    Nenadic, Aleksandra
    Zhang, Ning
    Shi, Qi
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (05) : 757 - 777
  • [3] A security protocol for certified e-goods delivery
    Nenadic, A
    Zhang, N
    Barton, S
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 22 - 28
  • [4] Timed-release encryption with pre-open capability and its application to certified e-mail system
    Hwang, YH
    Yum, DH
    Lee, PJ
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 344 - 358
  • [5] Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability
    Ghadafi, Essam
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 327 - 347
  • [6] Identity-based deniable authenticated encryption and its application to e-mail system
    Fagen Li
    Zhaohui Zheng
    Chunhua Jin
    Telecommunication Systems, 2016, 62 : 625 - 639
  • [7] Identity-based deniable authenticated encryption and its application to e-mail system
    Li, Fagen
    Zheng, Zhaohui
    Jin, Chunhua
    TELECOMMUNICATION SYSTEMS, 2016, 62 (04) : 625 - 639