scispace - formally typeset
Proceedings ArticleDOI

Digital Signature

Ravneet Kaur, +1 more
- pp 295-301
TLDR
This paper describes the different key factor of digital signature with the working ofdigital signature, through various methods and procedures involved in signing the data or message by using digital signature, and introduces algorithms used in digital signatures.
Abstract
There are different types of encryption techniques are being used to ensure the privacy of data transmitted over internet. Digital Signature is a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity of digital message/sender and non-repudiation of sender. Digital Signature is embedded in some hardware device or also exits as a file on a storage device. Digital Signature are signed by third party some certifying authority. This paper describe the different key factor of digital signature with the working of digital signature, through various methods and procedures involved in signing the data or message by using digital signature. It introduces algorithms used in digital signatures.

read more

Citations
More filters
Book ChapterDOI

Note du Secrétariat

Ola
TL;DR: Aux termes de l'Article 102 de the Charte des Nations Unies, tout traite ou accord international conclu par un Membre des Nations UNies apres l'entree en vigueur de la Charte sera, le plus tot possible, enregistre au Secretariat and publie par lui as discussed by the authors.
Journal ArticleDOI

Hashing Techniques: A Survey and Taxonomy

TL;DR: This survey reviews and categorizes existing hashing techniques as a taxonomy, in order to provide a comprehensive view of mainstream hashing techniques for different types of data and applications.
Journal ArticleDOI

Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System

TL;DR: A cloud-based EHR model that performs attribute-based access control using extensible access control markup language, focused on security, performs partial encryption and uses electronic signatures when a patient’s document is sent to a document requester.
Proceedings ArticleDOI

Analysis of Identity Management Systems Using Blockchain Technology

TL;DR: This paper investigates and gives analysis of the most popular Identity Management Systems using Blockchain: uPort, Sovrin, and ShoCard, and evaluates them under a set of features of digital identity that characterizes the successful of an Identity Management solution.
Journal ArticleDOI

A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing

TL;DR: The experimental results show that the proposed tamper detection, localization, and recovery scheme can not only distinguish the type of tamper and find the tampered blocks but also recover the main information of the original image.
References
More filters
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Book

Integrity primitives for secure information systems : final report of RACE Integrity Primitives Evaluation RIPE-RACE 1040

TL;DR: The MDC-4, RIPEMD, RIPE-MAC, IBC-hash, SKID, RSA, COMSET, and RSA key generation guidelines for arithmetic computation are described.