Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Digital signature scheme

In addition to all these possible practical applications, digital signature schemes are important building blocks for many theoretical protocols in the field of distributed computing. [Pg.2]

For all these reasons, digital signature schemes seem to be the part of modem cryptology that is most accepted in society and has the best chance of being promoted by governments and industry. [Pg.2]

Three related types of cryptologic schemes are not always precisely distinguished from digital signature schemes ... [Pg.8]

This symmetry between senders and recipients is usually reflected in the system structure the schemes are then called symmetric authentication schemes (see Section 2.1). In contrast, digital signature schemes are sometimes called asymmetric authentication schemes. However, schemes exist that provide mere authentication and are not symmetric in this sense [OkOh91] (called non-transitive signature schemes there). [Pg.8]

This third demarcation seems unnecessary from a purely scientific point of view, but for several practical reasons, it is not Digital signature schemes, and authentication schemes generally, have nothing to do with keeping messages secret. For that purpose, one has secrecy schemes. [Pg.9]

Hence, authentication schemes, and digital signature schemes in particular, carmot be treated as a variant of secrecy schemes, but need both definitions and constructions of their own. [Pg.9]

This is why invisible signatures were introduced in [ChAn90]. (Conversely, if one says that the purpose of digital signature schemes is to imitate handwritten signatures as closely as possible, an invisible signature scheme does too little.)... [Pg.10]

Moreover, the history of digital signature schemes is so closely linked to the history of the related types of schemes mentioned in Section 1.5 that parts of the history of those also have to be outlined. [Pg.11]

Working on the usual assumptions of classical cryptography, one would have thought that there is no such thing as a digital signature scheme Classical cryptographic schemes assume that a sender and a recipient have a common secret, which is unknown to outsiders from whom the sender and the recipient want to protect themselves. [Pg.11]

The idea that digital signature schemes might exist was first published in the directive article [DiHe76]. [Pg.13]

Figure 2.1. Components of ordinary digital signature schemes. Figure 2.1. Components of ordinary digital signature schemes.
A bit more precisely, the components of an ordinary digital signature scheme and their interaction are usually depicted as in Figure 2.2. ... [Pg.14]

The main security requirement on such a digital signature scheme is, roughly speaking, that one cannot forge signatures although one knows the public key. A necessary (but not sufficient) condition for this is that one cannot compute the secret key from the public key. [Pg.14]

The security of such digital signature schemes can therefore only be computational, i.e., hold in the sense of complexity theory It relies on the fact that in reality, a forger has too little time to carry out the trivial forging algorithm, and that no much more efficient forging algorithm is available. [Pg.15]

Digital signature schemes have one more advantage over symmetric authentication schemes, besides allowing disputes to be settled Key distribution is simpler. [Pg.16]

In the theoretical treatment of digital signature schemes, one simply assumes that a reliable broadcast network can be used during a special key-distribution phase. Only the real messages, later on, are sent over arbitrary channels. [Pg.16]

First, this may happen without any specific goal. If digital signature schemes and their usage are not standardized, different organizations will use different signature schemes with their clients, and the keys will therefore be different, too. Even successive keys for the same purpose will have overlapping periods of validity. [Pg.18]

In [DiHe76], the idea of digital signatures was introduced, together with applications and discussions of possible approaches and security limits, but only a very inefficient concrete digital signature scheme could be presented. [Pg.18]


See other pages where Digital signature scheme is mentioned: [Pg.1]    [Pg.1]    [Pg.1]    [Pg.2]    [Pg.2]    [Pg.3]    [Pg.4]    [Pg.6]    [Pg.7]    [Pg.8]    [Pg.8]    [Pg.9]    [Pg.10]    [Pg.10]    [Pg.11]    [Pg.11]    [Pg.12]    [Pg.12]    [Pg.13]    [Pg.14]    [Pg.15]    [Pg.15]    [Pg.15]    [Pg.16]    [Pg.16]    [Pg.17]    [Pg.17]    [Pg.18]    [Pg.18]    [Pg.19]    [Pg.19]    [Pg.20]   


SEARCH



Digital signatures

Example of interface events and entities if an ordinary digital signature scheme is modeled

History of Digital Signature Schemes

Invention of Digital Signature Schemes

Ordinary digital signature scheme

Requirements on Digital Signature Schemes

Signature

Signature scheme

Standard ordinary digital signature scheme

© 2024 chempedia.info