A Randomized Protocol for Signing Contracts
At the end of an honest execution of the protocol, each party has a signature of the other.
If one party, X, executes the protocol honestly, his counterpoint, Y, cannot obtain X’s signature to the contract without yielding his own signature.
KeywordsConventional System Data Encryption Decryption Algorithm Threshold Scheme Oblivious Transfer
Unable to display preview. Download preview PDF.
- Even, S., and Yacobi, Y., Relations Among Public Key Signature Systems, TR#175, Computer Science Dept., Technion, Haifa, Israel, March 1980.Google Scholar
- Even, S., A Protocol for Signing Contracts, TR#231, Computer Science Dept., Technion, Haifa, Israel, January 1982.Google Scholar
- Blum, M., and Rabin, M.O., How to Send Certified Electronic Mail. In preparation.Google Scholar
- Blum, M., How to Exchange (secret) Keys, Memo No. UCB/ERL M81/90, March 1982. To appear in CACM.Google Scholar
- Rabin, M.O., Private communication.Google Scholar
- Data Encryption Standard, National Bureau of Standards, Federal Information Processing Standards, Publ. 46, 1977.Google Scholar