2015
DOI: 10.1007/978-3-319-19713-5_36
|View full text |Cite
|
Sign up to set email alerts
|

Non-conventional Digital Signatures and Their Implementations—A Review

Abstract: Esta es la versión de autor de la comunicación de congreso publicada en: This is an author produced version of a paper published in: Abstract. The current technological scenario determines a profileration of trust domains, which are usually defined by validating the digital identity linked to each user. This validation entails critical assumptions about the way users' privacy is handled, and this calls for new methods to construct and treat digital identities. Considering cryptography, identity management has … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 43 publications
0
7
0
Order By: Relevance
“…It should be noted that there are several types of signatures, and each of them has its corresponding protocol, specifically designed to consider certain particular situations not included in the general and standard approach of a classic digital signature [18]. In the next paragraphs, some of these types of signatures, which are used in blockchain, are briefly presented.…”
Section: Other Digital Signaturesmentioning
confidence: 99%
“…It should be noted that there are several types of signatures, and each of them has its corresponding protocol, specifically designed to consider certain particular situations not included in the general and standard approach of a classic digital signature [18]. In the next paragraphs, some of these types of signatures, which are used in blockchain, are briefly presented.…”
Section: Other Digital Signaturesmentioning
confidence: 99%
“…Therefore, in this cloud services, anonymous authentication mechanisms are mandatory if the user really needs to get an adequate privacy in the cloud [29]. A way to achieve this type of authentication is through non-conventional digital signatures, like group signatures, which allow members of a group of signers to issue signatures on behalf of the group that can be verified without telling which specific member issued it [30].…”
Section: Solutionsmentioning
confidence: 99%
“…Although it is possible to reach a conclusion about physical identity, it is not easy to establish a relationship between physical identity and digital identity. Cryptography provides the means for associating a digital identity to a user through asymmetric cryptography [30]. Consequently, the verification of the integrity of IT assets has been conceived and managed through conventional digital signatures.…”
Section: Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 3 shows an example image (a), the same image encrypted with IBC (b) and the resulting image after embedding the IBS-1 signature into it. The theoretical specification of a cryptographic system should be complemented by a properly engineered and rigorously verified implementation [27]. We have used the jPair [28] cryptographic library to implement the IBS-1 signature.…”
Section: Using Identity-based Short Signaturesmentioning
confidence: 99%