Signatures with efficient protocols are a form of
digital signature invented by
Jan Camenisch and
Anna Lysyanskaya in 2001. In addition to being secure digital signatures, they need to allow for the efficient implementation of two protocols:
# A protocol for computing a digital signature in a
secure two-party computation protocol.
# A protocol for proving knowledge of a digital signature in a
zero-knowledge protocol.
In applications, the first protocol allows a signer to possess the signing key to issue a signature to a user (the signature owner) without learning all the messages being signed or the complete signature.
The second protocol allows the signature owner to prove that he has a signature on many messages without revealing the signature and only a (possibly) empty subset of the messages.
The combination of these two protocols allows for the implementation of
digital credential Digital credentials are the digital equivalent of paper-based credentials. Just as a paper-based credential could be a passport, a driver's license, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket or ...
and
ecash protocols.
See also
*
Topics in cryptography
The following outline is provided as an overview of and topical guide to cryptography:
Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer scie ...
References
Further reading
* Jan Camenisch, Anna Lysyanskaya
A Signature Scheme with Efficient Protocols SCN 2002: 268-289
*
*
*
* {{cite journal , page=75 , journal =
Informatica
Informatica Inc. is an American software development company founded in 1993. It is headquartered in Redwood City, California. Its core products include enterprise cloud data management and data integration. It was co-founded by Gaurav Dhillon a ...
, date=March 1, 2012, volume=36, issue=1 , title=Times limited accountable anonymous online submission control system from single-verifier ''k''-times group signature , author=Zhao, Xingwen , author2=
Zhang, Fangguo , access-date=October 11, 2012, url=http://www.informatica.si/PDF/36-1/12_Zhao%20-%20Times%20Limited%20Accountable%20Anonymous%20Online%20Submission%20Control%20System%20from.pdf , archive-url=https://web.archive.org/web/20120425113655/http://www.informatica.si/PDF/36-1/12_Zhao%20-%20Times%20Limited%20Accountable%20Anonymous%20Online%20Submission%20Control%20System%20from.pdf , archive-date=2012-04-25
Cryptography