Secure Signature ProtocolReport as inadecuate

Secure Signature Protocol - Download this document for free, or read online. Document in PDF available to download.

This paper studies how to take advantage of other-s computing ability to sign a message with one-s private key without disclosing the private key. A protocol to this problem is presented, and it is proven, by well known simulation paradigm, that this protocol is private.


cryptography, secure computation, signature, service, protocol

Cite this paper

S. LI, D. WANG and Y. DAI -Secure Signature Protocol,- Intelligent Information Management, Vol. 1 No. 3, 2009, pp. 174-179. doi: 10.4236-iim.2009.13026.

Author: Shundong LI, Daoshun WANG, Yiqi DAI



Related documents