2000
DOI: 10.1109/49.839935
|View full text |Cite
|
Sign up to set email alerts
|

Optimistic fair exchange of digital signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
403
0
7

Year Published

2001
2001
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 406 publications
(410 citation statements)
references
References 21 publications
0
403
0
7
Order By: Relevance
“…We have identified two applications of our scheme: fair exchange protocols and verifiable group encryption. Using our TPM-based protocols, we construct a verifiable group encryption scheme and solve an open problem in Asokan et al's paper [1]: making their protocol non-interactive and bringing down the cost of the verifiable escrow operation. Other applications may also benefit from our techniques, including applications such as group signatures and identity escrow schemes.…”
Section: Our Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…We have identified two applications of our scheme: fair exchange protocols and verifiable group encryption. Using our TPM-based protocols, we construct a verifiable group encryption scheme and solve an open problem in Asokan et al's paper [1]: making their protocol non-interactive and bringing down the cost of the verifiable escrow operation. Other applications may also benefit from our techniques, including applications such as group signatures and identity escrow schemes.…”
Section: Our Contributionmentioning
confidence: 99%
“…The protocol is such that V is convinced that the received ciphertext will decrypt to a value s which satisfies the necessary property, but other than this fact V is not able to discover any additional information about the value s. In a typical application, a honest prover will later reveal the secret, and the trusted party is only involved if the protocol does not complete and V needs to recover the secret without the assistance of P . Verifiable encryption has been used to construct solutions for fair exchange [1,2], escrow schemes [29], and signature sharing schemes [17]. In this paper we solve a generalized, more powerful version known as verifiable group encryption, in which there are multiple semi-trusted parties ("recovery agents" or "proxies") and authorized subsets of agents.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…If it is a fake membership certificate that includes ciphertext c, it checks whether this certificate also includes the value Z :=Z/(ar 1 3 ). If it does not, then D knows that the verifier will reject anyway -so it forwards the message to V .…”
Section: Proof Of Security and Appointed Verifier Propertymentioning
confidence: 99%
“…Verifiable encryption [1,8], is a protocol between a prover and a verifier such that as a result of the protocol, on input public key E, and value v, the verifier obtains an encryption e of some value s under E such that (w, y) ∈ R. For instance, R could be the relation (w, g w ) ⊂ Z q × G. Generalizing the protocol of Asokan et al [1], Camenisch and Damgård [8] provide a verifiable encryption scheme for a class of relations that, in particular, includes all discrete-logarithm relations that are of relevance in this paper. We denote verifiable encryption similarly as the PK 's, e.g., e := VE(ElGamal, (u, v)){ξ : y = g ξ } denotes the verifiable encryption protocol for the ElGamal scheme, whereby log g y is encrypted in e under public key (u, v).…”
Section: Verifiable Encryptionmentioning
confidence: 99%