A new family of authentication protocols
ACM SIGOPS Operating Systems Review
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
How to Construct Fail-Stop Confirmer Signature Schemes
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Fail-Stop Signature for Long Messages
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization
ISW '00 Proceedings of the Third International Workshop on Information Security
Improved Magic Ink Signatures Using Hints
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Provably secure fail-stop signature schemes based on RSA
International Journal of Wireless and Mobile Computing
Methods for image authentication: a survey
Multimedia Tools and Applications
Collision-free accumulators and fail-stop signature schemes without trees
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
An efficient fail-stop signature scheme based on factorization
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Efficient fail-stop signatures from the factoring assumption
ISC'11 Proceedings of the 14th international conference on Information security
Cramer-Damgård signatures revisited: efficient flat-tree signatures based on factoring
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Hi-index | 0.00 |
From the Publisher:This book is based on the author's Ph.D. thesis which was selected during the 1995 GI Doctoral Dissertation Competition as the winning thesis in the foundations-of-informatics track. Birgit Pfitzmann did her Ph.D. work at the University of Hildesheim with Professor Joachim Biskup as advisor. Securing integrity for digital communications in the age of global electronic information exchange and electronic commerce is of vital interest for democratic societies and a central technical challenge for cryptologists. As core contribution to advancing the state of the art, the author rigorously develops the new class of digital fail-stop signatures: in contrary to all previously introduced digital signature schemes, these new signatures enable the supposed signer to actually prove forging of the scheme in the case of a successful attack. This monograph is self-contained with respect to the historical background and cryptographic primitives used. For the first time, a general and sophisticated framework is introduced in which previously proposed and the innovative failstop signatures are systematically presented and evaluated, from theoretical foundations up to engineering aspects. Thus the book is compulsory reading for anybody interested in secure digital communication at the professional level.