Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/15105
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKale P.
dc.contributor.authorHazarika P.
dc.contributor.authorChandavarkar B.R.
dc.date.accessioned2021-05-05T10:16:26Z-
dc.date.available2021-05-05T10:16:26Z-
dc.date.issued2020
dc.identifier.citation2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020 , Vol. , , p. -en_US
dc.identifier.urihttps://doi.org/10.1109/ICCCNT49239.2020.9225482
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/15105-
dc.description.abstractNowadays, almost all business organizations, committees use the internet to do transactions and confidential information exchange. So it is crucial to make these transactions secure and reliable. A system to be confident and trustworthy needs a function of cryptography, and also it must manage the keys of cryptography. The digital signature, which is universally verifiable, is a solution when there are disputes between the sender and receiver. Later the undeniable signature scheme was introduced as a modern technique to verify the validity of a message sent by the sender. The undeniable signature scheme has its properties to protect the interests of the sender and receiver. An authenticated verifier only can check the signature with the approval of the signer. In this paper, we have discussed various undeniable signature schemes-key generation, signature verification, and disavowal protocol. This paper compares different schemes of the undeniable signature on the various notations of security. © 2020 IEEE.en_US
dc.titleUndeniable Signature Scheme: A Surveyen_US
dc.typeConference Paperen_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.