scispace - formally typeset
Journal ArticleDOI

Digital signatures — An overview

Stephen M. Matyas
- 01 Apr 1979 - 
- Vol. 3, Iss: 2, pp 87-94
Reads0
Chats0
TLDR
Two types of digital signatures are investigated: true signatures, and arbitrated signatures: a true signature can be validated by anyone having the correct nonsecret (public) validation parameter, whereas an arbitrated signature must be validate by a trusted arbiter.
About
This article is published in Computer Networks.The article was published on 1979-04-01. It has received 33 citations till now. The article focuses on the topics: Digital signature & Electronic signature.

read more

Citations
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

A digital signature scheme secure against adaptive chosen-message attacks

TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Patent

Customer activated multi-value (CAM) card

TL;DR: The Customer Activated Multi-Value (CAM) card as mentioned in this paper provides a customer with a primary use as a transaction card which can be further activated to have a secondary use as credit card.
Proceedings ArticleDOI

Cryptographic protocols

TL;DR: A cryptographic transformation is a mapping f from a set of cleartext messages, M, to aSet of ciphertext messages, f, so that f(m) should be difficult to infer from f and public knowledge about f.
Patent

System and method for selectable funding of electronic transactions

TL;DR: In this article, a system for transferring funds to pay bills and to and from selected accounts on an optimized is provided, where a mediation engine may manage the payments made to selected payees, including by scheduling the payments and selecting sources for funds.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

Hiding information and signatures in trapdoor knapsacks

TL;DR: Specific instances of the knapsack problem that appear very difficult to solve unless one possesses "trapdoor information" used in the design of the problem are demonstrated.
Journal ArticleDOI

A cryptographic key management scheme for implementing the data encryption standard

TL;DR: A possible key management scheme that provides the support necessary to protect communications between individual end users (end-to-end encryption) and that also can be used to protect data stored or transported on removable media is discussed.