Journal ArticleDOI
Digital signatures — An overview
Reads0
Chats0
TLDR
Two types of digital signatures are investigated: true signatures, and arbitrated signatures: a true signature can be validated by anyone having the correct nonsecret (public) validation parameter, whereas an arbitrated signature must be validate by a trusted arbiter.About:
This article is published in Computer Networks.The article was published on 1979-04-01. It has received 33 citations till now. The article focuses on the topics: Digital signature & Electronic signature.read more
Citations
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
A digital signature scheme secure against adaptive chosen-message attacks
TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Patent
Customer activated multi-value (CAM) card
TL;DR: The Customer Activated Multi-Value (CAM) card as mentioned in this paper provides a customer with a primary use as a transaction card which can be further activated to have a secondary use as credit card.
Proceedings ArticleDOI
Cryptographic protocols
TL;DR: A cryptographic transformation is a mapping f from a set of cleartext messages, M, to aSet of ciphertext messages, f, so that f(m) should be difficult to infer from f and public knowledge about f.
Patent
System and method for selectable funding of electronic transactions
TL;DR: In this article, a system for transferring funds to pay bills and to and from selected accounts on an optimized is provided, where a mediation engine may manage the payments made to selected payees, including by scheduling the payments and selecting sources for funds.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
Hiding information and signatures in trapdoor knapsacks
TL;DR: Specific instances of the knapsack problem that appear very difficult to solve unless one possesses "trapdoor information" used in the design of the problem are demonstrated.
Journal ArticleDOI
A cryptographic key management scheme for implementing the data encryption standard
TL;DR: A possible key management scheme that provides the support necessary to protect communications between individual end users (end-to-end encryption) and that also can be used to protect data stored or transported on removable media is discussed.