Results 11 to 20 of about 609,879 (270)

An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain

open access: yesIEEE Access, 2021
The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation in the process of signature and verification, which greatly reduces the efficiency of digital signatures.
Shuang-Gen Liu, Wan-Qi Chen, Jia-Lu Liu
doaj   +3 more sources

Digital signature scheme for information non-repudiation in blockchain: a state of the art review

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
Blockchain, as one of the most promising technology, has attracted tremendous attention. The interesting characteristics of blockchain are decentralized ledger and strong security, while non-repudiation is the important property of information security ...
Weidong Fang   +5 more
doaj   +3 more sources

On the security of digital signature schemes based on error-correcting codes [PDF]

open access: yes, 2003
We discuss the security of digital signature schemes based on error-correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the ...
Doumen, Jeroen   +2 more
core   +19 more sources

Implementation of Boneh - Lynn - Shacham short digital signature scheme using Weil bilinear pairing based on supersingular elliptic curves

open access: yesVietnam Journal of Science, Technology and Engineering, 2022
One option for a digital signature solution for devices with low memory and low bandwidth transmission over channels uses a short digital signature scheme based on Weil bilinear pairing aimed at short processing times, fast computation, and convenient ...
Nhu-Quynh Luc   +2 more
doaj   +1 more source

Digital signature: advantages, challenges and strategies [PDF]

open access: yesJournal of Social Sciences, 2020
Digital signature solutions are rapidly replacing classic signatures and have the potential to dominate signature-related processes. The concept of a digital signature is based on the transition from paper to electronic documentation and the automation ...
ȚURCANU, Dinu   +2 more
doaj   +1 more source

Digital Signatures [PDF]

open access: yes, 2020
This is just an overviewof the Digital Signaturetopic andthere are different types of encryption techniques are being used to ensure the privacy of data transmitted over the internet.Digital Signatureis a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity ofdigitalmessage/sender and non-repudiation of the ...
Jiang Zhang, Zhenfeng Zhang
  +4 more sources

Aplikasi Tandatangan Digital dalam Proses Verifikasi dan Validasi Sertifikat Covid-19

open access: yesTechno.Com, 2023
Pandemi Covid-19 menyebabkan syarat berpergian ke luar kota, provinsi bahkan luar negeri harus memiliki surat bebas Covid-19. Untuk mencegah tindak pemalsuan, keaslian dan legalitas dari surat bebas Covid-19, digital signature merupakan salah satu teknik
Yulia Fatma   +3 more
doaj   +1 more source

Comparative Study of Digital Signature Standards Based on Discrete Logarithm [PDF]

open access: yesJisuanji gongcheng, 2016
As Chinese state encryption administration is seeking the next generation of Digital Signature Standard(DSS),this paper analyzes and compares seven DSS listed in ISO/IEC 14888-3 and SM2 which are based on Discrete Logarithm Problem(DLP) or Elliptic Curve
FENG Zeyu,GONG Boru,ZHAO Yunlei
doaj   +1 more source

Survey of digital signature technology based on error correcting codes

open access: yes网络与信息安全学报, 2016
The emergence of quantum algorithms have threatened the security of digital signature algorithms widely used currently,most of which based on some hard problems in number theory.The digital signature algorithms based on error correcting codes,which can ...
Fang REN, Dong ZHENG, Jiu-lun FAN
doaj   +3 more sources

Academic Document Authentication using Elliptic Curve Digital Signature Algorithm and QR Code

open access: yesJOIV: International Journal on Informatics Visualization, 2022
Paper-based documents or printed documents such as recommendation letters, academic transcripts, and diplomas are prone to forgery. Several methods have been used to protect them, such as watermarking, security holograms, or using paper with specific ...
Theophilus Wellem   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy