Double-Authentication-Preventing Signatures

Download Now
Provided by: Queensland Treasury Corporation
Topic: Security
Format: PDF
The digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, the certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a malicious or coerced authority can make multiple certifications for the same subject but different objects.
Download Now

Find By Topic