SEARCH Articles Figures Tables Existing fail-stop signature schemes, classified according to risk bearers Overview of Existing Schemes with Other than Ordinary Security Possible and correct invisible signatures in existing schemes