Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Secure electronic commerce: building the infrastructure for digital signatures and encryption
Secure electronic commerce: building the infrastructure for digital signatures and encryption
Simple forward-secure signatures from any signature scheme
Proceedings of the 7th ACM conference on Computer and communications security
On the validity of digital signatures
ACM SIGCOMM Computer Communication Review
A Forward-Secure Digital Signature Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Securing digital signatures for non-repudiation
Computer Communications
Hi-index | 0.15 |
Electronic transactions with commercial values between two business parties may want to be legally bound. Digital signature is an important security mechanism to provide evidence regarding the status of a transaction. However, evidence solely based on digital signatures may not enforce strong nonrepudiation. Additional mechanisms are required to make digital signatures as valid non-repudiation evidence in the settlement of possible disputes. The conventional approach is to invoke a time-stamping service from a trusted third party. But it may become hard to deploy B2B applications in which no on-line third party is involved. In this paper, we present an efficient mechanism for maintaining the validity of digital signatures in direct B2B applications without the involvement of a trusted third party.