Research Article

Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

Table 2

Comparisons of undetachable digital signature schemes.

SchemeExtra security featureFormal proof of securityComputational infeasible problem

[3]NoNoFactorization of big integer
[4]Bilateral securityNoFactorization of big integer
[5]NoNo-Strong Diffie–Hellman problem
[6]Threshold securityNoFactorization of big integer
[7]NoNoDiscrete logarithm on elliptic curves
[8]NoNoComputational co-Diffie–Hellman problem
[9]Threshold securityNoDiscrete logarithm on conic curves
[10]Forward-secureYesComputational co-Diffie–Hellman problem
This workKey-insulatedYesComputational Diffie–Hellman problem