This paper describes one of the few digital signature schemes, which is essentially immune to quantum computers-based attacks. The optimized version of the scheme is offered in the article. This scheme is much more efficient than the original one and has the stronger security guarantees. Further...
However, these schemes have a common weakness in security, that is, different messages may easily be computed that have the same signature. Thus, a valid signature could be reused in another document. This severely violates the principles of digital signature. In this paper, we shall show that...
英文名称:Information technology -- Security techniques -- Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms 标准状态:现行 发布日期:2010-12-15 文档简介 ISO/IEC9796-2:2010标准是关于信息技术安全技术数字签名的规定,其中给出了基于整数因子分解技术的机制。以...
Digital signature technology has only been around for a little over 50 years. In this time, major advancements have been made in the creation of secure digital signature schemes as well as the emergence of use cases. Here’s a basic overview of some of the most notable events in this time...
From the abstract: A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new generation of computing devices such as quantum computers. In this work, we focus on signature schemes...
To be considered valid, e-signature schemes must include the following three capabilities: A way to verify the identity of the entity signing it. A way to verify the signing entity intended to affirm the document being signed. A way to verify that the e-signature is associated with the sign...
网络数字签名方案 网络释义 1. 数字签名方案 5.2.2数字签名方案(Digital Signature Schemes)94-97 cdmd.cnki.com.cn|基于 1 个网页 释义: 全部,数字签名方案
Aiming at the problem of key disclose in existed digital signature schemes,a strong forward secure signature scheme,which is based on Guillou-Quisquater signature and Rabin cryptosystem is proposed.In this new scheme,the signer can produce one signature key by the traditional forward technology,and ...
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer of trust in the other direction, from the signed data to the public key. Such a transfer is cryptographically robu...
With the development of the technology of computer and network communication, digital signature schemes have got extensive application. Based on digital signature scheme DSA, this paper proposes a (t,n) shared verification scheme. It doesn't produce the prohlem that the signature can be easily fo...