2019
DOI: 10.1016/j.ins.2018.05.022
|View full text |Cite
|
Sign up to set email alerts
|

CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
28
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 52 publications
(30 citation statements)
references
References 12 publications
0
28
0
Order By: Relevance
“…Fortunately, the trapdoor commitment used in this protocol can be find easily. In [18], [27] the author reported how to construct trapdoor commitment scheme from RSA assumption, while [18], [29] is a discrete log(DL)-based instantiation using a free trapdoor commitment scheme, which can be used in the Schnorr signature, EIGamal signature, or DSA, etc. So, no matter which kind of public key published by the receiver, at least one trapdoor commitment scheme can be used.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Fortunately, the trapdoor commitment used in this protocol can be find easily. In [18], [27] the author reported how to construct trapdoor commitment scheme from RSA assumption, while [18], [29] is a discrete log(DL)-based instantiation using a free trapdoor commitment scheme, which can be used in the Schnorr signature, EIGamal signature, or DSA, etc. So, no matter which kind of public key published by the receiver, at least one trapdoor commitment scheme can be used.…”
Section: Related Workmentioning
confidence: 99%
“…In [29], the two parameters of trapdoor commitment should be given by receivers. However, in [18], [26] the parameters s and u are set before the protocol's execution. In our protocol, the parameters also can be set as a fixed value, e.g.…”
Section: B Sigature Exchangementioning
confidence: 99%
See 1 more Smart Citation
“…The big data has become a key component for intelligent systems, such as intelligent vehicular networks, smart cities and it has been applied in the field of criminal data analysis. This interconnectivity together with large-scale data processing and new electronic techniques steadily brings innovation and business models of the digital space into the physical world [1][2][3]. It would extend tradition data technologies by incorporating knowledge from domain experts as well as the latest artificial intelligence solution, such as how to perform decision support with the case data collected by secure systems.…”
Section: Introductionmentioning
confidence: 99%
“…grid [4] and intelligent manufacturing [5], [6]. The WSS is a type of distributed, multihop and self-configuring sensor system that is equipped with an enormous number of sensor nodes [7], [8].…”
mentioning
confidence: 99%