scispace - formally typeset
Search or ask a question
Author

Aki

Bio: Aki is an academic researcher from Queen's University. The author has contributed to research in topics: Digital signature & Encryption. The author has an hindex of 1, co-authored 1 publications receiving 94 citations.

Papers
More filters
Journal ArticleDOI
Aki1
TL;DR: This article on digital signature schemes is a survey of work done in the area since the concept was introduced in 1976.
Abstract: As paper gives way to electronic mail, a secure means for validating and authenticating messages is required. The answer could be one of several digital signature schemes. In the last few years, research in cryptography has provided various methods for generating digital signatures, both true and arbitrated. Some of these methods utilize conventional private-key cryptosystems such as the Data Encryption Standard (DES), while others are based on the so-called public-key approach. This article on digital signature schemes is a survey of work done in the area since the concept was introduced in 1976. For readers unfamiliar with modern cryptology several overview articles and a number of texts on the subject are noted among the list of references of this article.

96 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper clearly defines the properties a fair non-repudiation protocol must respect, and gives a survey of the most important non- repudiation protocols without and with trusted third party (TTP).

293 citations

Patent
15 Apr 1994
TL;DR: A personal data/time notary device is embodied in a token device such as a "smart card" as mentioned in this paper, which includes an input/output (I/O) port, which is coupled to a single integrated circuit chip.
Abstract: A personal data/time notary device is embodied in a token device such as a "smart card". The portable notary device includes an input/output (I/O) port, which is coupled to a single integrated circuit chip. The I/O port may be coupled to a conventional smart card reading device which in turn is coupled to a PC, lap-top computer or the like. A tamper resistant secret private key storage is embodied on the chip. The private key storage is coupled to the processor which, in turn, is coupled to a permanent memory that stores the program executed by the processor. At least one clock is embodied on the card. A second clock 14 and a random value generator 10 are also preferably coupled to the processor. The device combines digital time notarization into a digital signature operation to ensure that a time stamp is always automatically present. The user does not need to be involved in any additional decision making as to whether time stamping is necessary.

247 citations

Patent
12 Dec 1996
TL;DR: In this article, a system and method relating to secure communications in a communication network is disclosed, which uses sessions having limited duration to enable parties to communicate securely in the communication network.
Abstract: A system and method relating to secure communications in a communication network is disclosed. The invention uses sessions having limited duration to enable parties to communicate securely in the communication network. The session of one party is independent from the session of another party. The sessions are linked at a server which confirms that the sessions are valid. In a preferred embodiment, the secure communications occur in an electronic transfer system. In the electronic transfer system, a customer and a merchant can conduct a transaction wherein the customer can purchase a product from the merchant and pay for the product using electronic funds.

198 citations

Patent
Kevin W. Kingdon1
02 Nov 1993
TL;DR: In this article, a method and apparatus for message packet authentication to prevent the forging of message packets is presented, where a portion of the message digest, referred to as the signature, is then appended to the actual message when it is sent over the wire.
Abstract: The present invention provides a method and apparatus for message packet authentication to prevent the forging of message packets. A portion of the message digest, referred to as the signature, is then appended to the actual message when it is sent over the wire (205). The receiving station strips the signature from the message (208), preappends the same secret session key (209) and creates its own message digest (212). The signature of the digest created by the receiving station is compared to the signature of the digest appended by the sending station (213). If there is a match, an authentic message is assumed (214). If there is no match, the message is considered as invalid and discarded (216).

160 citations