Research Article
Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce
Table 2
Comparisons of undetachable digital signature schemes.
| Scheme | Extra security feature | Formal proof of security | Computational infeasible problem |
| [3] | No | No | Factorization of big integer | [4] | Bilateral security | No | Factorization of big integer | [5] | No | No | -Strong Diffie–Hellman problem | [6] | Threshold security | No | Factorization of big integer | [7] | No | No | Discrete logarithm on elliptic curves | [8] | No | No | Computational co-Diffie–Hellman problem | [9] | Threshold security | No | Discrete logarithm on conic curves | [10] | Forward-secure | Yes | Computational co-Diffie–Hellman problem | This work | Key-insulated | Yes | Computational Diffie–Hellman problem |
|
|