Author
Aki
Bio: Aki is an academic researcher from Queen's University. The author has contributed to research in topics: Digital signature & Encryption. The author has an hindex of 1, co-authored 1 publications receiving 94 citations.
Papers
More filters
••
TL;DR: This article on digital signature schemes is a survey of work done in the area since the concept was introduced in 1976.
Abstract: As paper gives way to electronic mail, a secure means for validating and authenticating messages is required. The answer could be one of several digital signature schemes. In the last few years, research in cryptography has provided various methods for generating digital signatures, both true and arbitrated. Some of these methods utilize conventional private-key cryptosystems such as the Data Encryption Standard (DES), while others are based on the so-called public-key approach. This article on digital signature schemes is a survey of work done in the area since the concept was introduced in 1976. For readers unfamiliar with modern cryptology several overview articles and a number of texts on the subject are noted among the list of references of this article.
96 citations
Cited by
More filters
••
TL;DR: This paper clearly defines the properties a fair non-repudiation protocol must respect, and gives a survey of the most important non- repudiation protocols without and with trusted third party (TTP).
293 citations
•
15 Apr 1994
TL;DR: A personal data/time notary device is embodied in a token device such as a "smart card" as mentioned in this paper, which includes an input/output (I/O) port, which is coupled to a single integrated circuit chip.
Abstract: A personal data/time notary device is embodied in a token device such as a "smart card". The portable notary device includes an input/output (I/O) port, which is coupled to a single integrated circuit chip. The I/O port may be coupled to a conventional smart card reading device which in turn is coupled to a PC, lap-top computer or the like. A tamper resistant secret private key storage is embodied on the chip. The private key storage is coupled to the processor which, in turn, is coupled to a permanent memory that stores the program executed by the processor. At least one clock is embodied on the card. A second clock 14 and a random value generator 10 are also preferably coupled to the processor. The device combines digital time notarization into a digital signature operation to ensure that a time stamp is always automatically present. The user does not need to be involved in any additional decision making as to whether time stamping is necessary.
247 citations
•
12 Dec 1996
TL;DR: In this article, a system and method relating to secure communications in a communication network is disclosed, which uses sessions having limited duration to enable parties to communicate securely in the communication network.
Abstract: A system and method relating to secure communications in a communication network is disclosed. The invention uses sessions having limited duration to enable parties to communicate securely in the communication network. The session of one party is independent from the session of another party. The sessions are linked at a server which confirms that the sessions are valid. In a preferred embodiment, the secure communications occur in an electronic transfer system. In the electronic transfer system, a customer and a merchant can conduct a transaction wherein the customer can purchase a product from the merchant and pay for the product using electronic funds.
198 citations
•
02 Nov 1993TL;DR: In this article, a method and apparatus for message packet authentication to prevent the forging of message packets is presented, where a portion of the message digest, referred to as the signature, is then appended to the actual message when it is sent over the wire.
Abstract: The present invention provides a method and apparatus for message packet authentication to prevent the forging of message packets. A portion of the message digest, referred to as the signature, is then appended to the actual message when it is sent over the wire (205). The receiving station strips the signature from the message (208), preappends the same secret session key (209) and creates its own message digest (212). The signature of the digest created by the receiving station is compared to the signature of the digest appended by the sending station (213). If there is a match, an authentic message is assumed (214). If there is no match, the message is considered as invalid and discarded (216).
160 citations