Summary of Digital Signature

With the increasing development of information application, the security of information has become a prominent problem. It also makes the digital signature technology has been rapid developed and applied. This paper introduces the concept, characteristics, related technologies of digital signatures, and the current research state of several types of digital signature. At last the use of digital signatures with various features is discussed.

[1]  Dawn Xiaodong Song,et al.  Practical forward secure group signature schemes , 2001, CCS '01.

[2]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[3]  Zhenfu Cao,et al.  Nonrepudiable proxy multi-signature scheme , 2003, Journal of Computer Science and Technology.

[4]  Holger Petersen,et al.  How to Convert any Digital Signature Scheme into a Group Signature Scheme , 1997, Security Protocols Workshop.

[5]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[6]  Jan Camenisch,et al.  Fair Blind Signatures , 1995, EUROCRYPT.

[7]  Donald W. Davies,et al.  Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.

[8]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[9]  Jean-Jacques Quisquater,et al.  Advances in Cryptology — EUROCRYPT ’95 , 2001, Lecture Notes in Computer Science.

[10]  Shafi Goldwasser,et al.  Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.

[11]  Jung Hee Cheon,et al.  An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.

[12]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[13]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[14]  Jan Camenisch,et al.  Efficient group signature schemes for large groups , 1997 .

[15]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[16]  Cao,et al.  Improvement of M-U-O and K-P-W proxy signature schemes , 2002 .

[17]  Douglas R. Stinson,et al.  Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.

[18]  Yang Yue Secure and efficient group blind signature scheme , 2009 .

[19]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[20]  Jan Camenisch,et al.  Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.

[21]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[22]  Stefan A. Brands,et al.  Untraceable Off-line Cash in Wallet with Observers , 2002 .

[23]  Jianying Zhou,et al.  Information and Communications Security , 2013, Lecture Notes in Computer Science.

[24]  Jan Camenisch,et al.  An efficient fair payment system , 1996, CCS '96.

[25]  Victor K.-W. Wei,et al.  A strong proxy signature scheme with proxy signer privacy protection , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[26]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[27]  Jan Camenisch,et al.  Blind Signatures Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.