Digital signatures: A tutorial survey
- 1 February 1983
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Computer
- Vol. 16 (2), 15-24
- https://doi.org/10.1109/mc.1983.1654294
Abstract
As paper gives way to electronic mail, a secure means for validating and authenticating messages is required. The answer could be one of several digital signature schemes. In the last few years, research in cryptography has provided various methods for generating digital signatures, both true and arbitrated. Some of these methods utilize conventional private-key cryptosystems such as the Data Encryption Standard (DES), while others are based on the so-called public-key approach. This article on digital signature schemes is a survey of work done in the area since the concept was introduced in 1976. For readers unfamiliar with modern cryptology several overview articles and a number of texts on the subject are noted among the list of references of this article.Keywords
This publication has 7 references indexed in Scilit:
- DIGITAL SIGNATURE SCHEMESCryptologia, 1982
- Digital Signitures with Blindfolded Arbitrators Who Cannot Form AlliancesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Protocols for Public Key CryptosystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- Encryption and Secure Computer NetworksACM Computing Surveys, 1979
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976