Security

On the Theory and Practice of Personal Digital Signatures

Download Now Free registration required

Executive Summary

The authors take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent players in the protocol, and where only the human user is assumed incorruptible. The authors then propose a protocol for issuing digital signatures on behalf of the user. This protocol is proactively UC-secure assuming at most one player is corrupted in every operational phase.

  • Format: PDF
  • Size: 289.6 KB