Special Signature Schemes and Key Agreement ProtocolsThesis Submission • May 21st, 2006
Contract Type FiledMay 21st, 2006This thesis is divided into two distinct parts. The first part of the thesis explores various deniable signature schemes and their applications. Such schemes do not bind a unique public key to a message, but rather specify a set of entities that could have created the signature, so each entity involved in the signature can deny having generated it. The main deniable signature schemes we examine are ring signature schemes.