Filters








2,247 Hits in 2.2 sec

A non-repudiation metering scheme

L. Harn, H.Y. Lin
2001 IEEE Communications Letters  
In this letter, we propose an efficient metering scheme that incorporates the hash-chaining technique and the digital signature algorithm to provide a nonrepudiation proof of this measured number.  ...  A metering scheme enables a web server to measure the number of visits from clients. In addition, a proof needs to be presented by the server as evidence corresponding to this measured number.  ...  The combination of and the digital signature of can be used as a nonrepudiation proof by the server as evidence of visits made by the client.  ... 
doi:10.1109/4234.974494 fatcat:jrcq3j3tvrg7fjgmhcwy5rjbrq

Authentication protocols with nonrepudiation services in personal communication systems

Hung-Yu Lin, Lein Harn
1999 IEEE Communications Letters  
Through the combination of the public-key digital signature and the hash-chaining techniques, a new set of authentication protocols is proposed with the capability of arbitrating disputed bills.  ...  They also help identify whether an accounting error, an internal fraud, or a security breach of the service provider causes the incorrect service charge.  ...  Authentication Protocols with Nonrepudiation Services in Personal Communication Systems Hung-Yu Lin and Lein Harn Abstract-Through the combination of the public-key digital signature and the hash-chaining  ... 
doi:10.1109/4234.781006 fatcat:i5bxwx363ndofld6vao2l4odpe

Paper-based Verification Design of Trade Business License in Indonesia

Pizaini Pizaini, Sugi Guritman, Heru Sukoco
2016 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
Our design implemented digital signature with QR Code image that placed into the document and the digital certificate issued by a certification authority (CA).  ...  The proposed scheme generated 442 Bytes of data and version 14 of QR Code to scan easily by a reader device.  ...  One of the algorithms of the digital signature is digital signature algorithm (DSA) which has O(n) complexity [4] .  ... 
doi:10.12928/telkomnika.v14i4.2915 fatcat:qjfbrw6byzfw3if6yaougyzu5q

Cryptanalysis and improvement of signcryption schemes

H. Petersen, M. Michels
1998 IEE Proceedings - Computers and digital Techniques  
In fact, the way to gain nonrepudiation violates the confidentiality. Moreover, we compare the schemes to previously known authenticated encryption schemes, which were not mentioned by Zheng.  ...  Therefore, to gain nonrepudiation in case of a dispute, a judge must be convinced by the verifier Bob, that the signature was issued by the signer Alice.  ...  However, it must be taken care that the separation of the signature and the ciphertext is avoided.  ... 
doi:10.1049/ip-cdt:19981862 fatcat:cajxlinfwba3fgio66if3amxp4

On the validity of digital signatures

Jianying Zhou, Robert Deng
2000 Computer communication review  
An important feature of digital signatures is to serve as nonrepudiation evidence.  ...  As signature keys may be compromised and the validity of signatures may become questionable, additional security mechanisms need to be imposed on digital signatures.  ...  DIGITAL VS HAND-WRITTEN SIGNA-TURE The concept of digital signature, which was invented by Diffie and Hellman [4] , forms an important basis for nonrepudiation services.  ... 
doi:10.1145/505680.505684 fatcat:pvd3cde4obdj7o4a7prdam6rhq

Cryptanalysis and improvement of Petersen–Michels signcryption scheme

W. -H. He, T. -C. Wu
1999 IEE Proceedings - Computers and digital Techniques  
Petersen and Michels showed that Zheng's signcryption schemes lose confidentiality to gain nonrepudiation.  ...  They also proposed another signcryption scheme modified from a signature scheme giving message recovery.  ...  Introduction At the Crypto'97 conference, Zheng [l] introduced a new type of cryptographic primitive termed 'signcryption', in which message encryption and digital signature are simultaneously fulfilled  ... 
doi:10.1049/ip-cdt:19990198 fatcat:3634jk7gzjalbnoog6g7ms6kva

Page 252 of American Society of Civil Engineers. Collected Journals Vol. 127, Issue 4 [page]

2001 American Society of Civil Engineers. Collected Journals  
Digitized sig- natures are being evaluated as a legal alternative (Phair 2001) for handwritten signatures in several states (Perkins) and hence would provide nonrepudiation in the case of legal claims  ...  Digitizedsignatures are the electronic equivalent of hand- written signatures, which can be embedded into documents.  ... 

CCITT/ISO standards for secure message handling

C. Mitchell, M. Walker, D. Rush
1989 IEEE Journal on Selected Areas in Communications  
The paper concludes with a discussion of certain limitations of the current X.400 security architecture.  ...  A brief introduction to relevant cryptographic concepts is followed by a description of how some of the security services may be provided.  ...  This fundamental property of digital signatures is the basis for all the nonrepudiation services in the X .400 recommendations.  ... 
doi:10.1109/49.17715 fatcat:bd3cuvag4fafbc2kjffl7hwbq4

Using cryptographic and. watermarking algorithms

J. Dittmann, P. Wohlmacher, K. Nahrstedt
2001 IEEE Multimedia  
We also survey revocation methods for digital certificates and introduce a mediaindependent classification scheme. 54  ...  We introduce the most important security requirements for all types of multimedia systems.  ...  We presented a preliminary version of parts of this article at the 2000 ACM Workshop on Multimedia and Security 38 and at the special session on Multimedia and Security at the IEEE International Conference  ... 
doi:10.1109/93.959103 fatcat:yo3dmoxdkngfjhbmci6uvuuroy

On Delegatability of Some Strong Designated Verifier Signature Schemes

Baoyuan Kang, Hao Xu, Yongzheng Niu
2014 Mathematical Problems in Engineering  
signature to a third party, and no third party can even verify the validity of a designated verifier signature.  ...  These schemes do not satisfy non delegatability secure requirement of strong designated verifier signature schemes.  ...  A SDVS scheme is special type of digital signature which provides message authentication without nonrepudiation.  ... 
doi:10.1155/2014/761487 fatcat:3wblb4uhkrdlperouqqdz4efxu

A new family of authentication protocols

Ross Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger Needham
1998 ACM SIGOPS Operating Systems Review  
Previously, one-time digital signatures based on hash functions involved hundreds of hash function computations for each signature; we show that given online access to a timestamping service, we can sign  ...  In addition to being of potential use in real applications, our constructions also raise interesting questions about the definition of a digital signature, and the relationship between integrity and authenticity  ...  In other words, the broadcast commitment step has the criticial effect of providing nonrepudiation, and gives the Guy Fawkes protocol the same effect as a digital signature.  ... 
doi:10.1145/302350.302353 fatcat:yx3jdrllivg25kp4mtuhgiykbe

XML, web services, and XML

Win Treese
2002 netWorker - Association for computing machinery  
The important questions now, of course, involve not only the efficacy of these proposed systems, but whether anyone will actually use them.  ...  Ever since the concept of "Web services" was defined, there have been questions about their security.  ...  Some people advocate the use of XML Digital Signatures for nonrepudiation as well, but the infrastructure needed to support nonrepudiation turns out to be bigger than most organizations want to create.  ... 
doi:10.1145/569207.569215 fatcat:wqn5nghcazet7mw2arra5zvh7u

A Case (Study) For Usability in Secure Email Communication

Apu Kapadia
2007 IEEE Security and Privacy  
Acknowledgments The author thanks Scott Rea for his insightful comments and willingness to read multiple drafts of this article.  ...  This package is called a digital signature and provides two basic properties: nonrepudiation and integrity.  ...  In practice, however, digital signatures are a weak line of defense.  ... 
doi:10.1109/msp.2007.25 fatcat:knjkcxq5rjcshpopp2lpkhoyhy

Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem

Youngjoo An, Hyang-Sook Lee, Juhee Lee, Seongan Lim
2018 Security and Communication Networks  
The notion of key substitution security on digital signatures in the multiuser setting has been proposed by Menezes and Smart in 2004.  ...  Along with the unforgeability of signature, the key substitution security is very important since it is a critical requirement for the nonrepudiation and the authentication of the signature.  ...  The US government standard for digital signatures states that nonrepudiation and authentication are main characteristics of a signature scheme [6] .  ... 
doi:10.1155/2018/8525163 fatcat:ktmzlmdunzcsddz2twwimx74je

Securing Wireless Body Area Network with Efficient Secure Channel Free and Anonymous Certificateless Signcryption

Fazal Noor, Turki A. Kordy, Ahmad B. Alkhodre, Oussama Benrhouma, Adnan Nadeem, Ali Alzahrani, Mohammed H. Alsharif
2021 Wireless Communications and Mobile Computing  
WBAN technology is primarily used to offer continuous screening of health data to patients, independent of their location, time, or activity.  ...  A WBAN, on the other hand, is vulnerable to different cyberattacks due to the openness of the wireless environment and the privacy of people's physiological data.  ...  Conflicts of Interest The authors declare no conflicts of interest with respect to the research, authorship, and/or publication of this article.  ... 
doi:10.1155/2021/5986469 fatcat:2u666g4jfngjvo6xpjgbepgimm
« Previous Showing results 1 — 15 out of 2,247 results