Results 11 to 20 of about 3,545,158 (344)

Non-conventional digital signatures and their implementations – A review [PDF]

open access: yesCISIS-ICEUTE, 2015
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-19713-5_36The current technological scenario determines a profileration of trust domains, which are usually defined by validating the digital identity linked to each
E Fujisaki   +6 more
core   +3 more sources

One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys [PDF]

open access: yesPhysical Review Applied, 2023
Quantum digital signatures (QDS), generating correlated bit strings among three remote parties for signatures through quantum law, can guarantee non-repudiation, authenticity, and integrity of messages. Recently, one-time universal hashing QDS framework,
Bing-Hong Li   +6 more
semanticscholar   +1 more source

Entanglement-based quantum digital signatures over a deployed campus network. [PDF]

open access: yesOptics Express, 2023
The quantum digital signature protocol offers a replacement for most aspects of public-key digital signatures ubiquitous in today's digital world. A major advantage of a quantum-digital-signatures protocol is that it can have information-theoretic ...
Joseph C. Chapman   +3 more
semanticscholar   +1 more source

Efficient quantum digital signatures without symmetrization step. [PDF]

open access: yesOptics Express, 2021
Quantum digital signatures (QDS) exploit quantum laws to guarantee non-repudiation, unforgeability and transferability of messages with information-theoretic security.
Yu-Shuo Lu   +7 more
semanticscholar   +1 more source

Digital Signature Legality And Evidence In Trials

open access: yesJurnal Ilmu Sosial Mamangan, 2022
Currently, the dynamics of Indonesian society are at the growing industrial and information society stage in which one example is the presence of the digital signature. Indonesia has not yet familiar with legislation concerning digital signatures.
Devi Cintiya Ramadhanti   +1 more
doaj   +1 more source

Twin-field quantum digital signatures. [PDF]

open access: yesOptics Letters, 2020
Digital signature is a key technique in information security, especially for identity authentications. Compared to classical correspondence, quantum digital signatures (QDSs) provide a considerably higher level of security. At present, its performance is
Chunhui Zhang   +4 more
semanticscholar   +1 more source

Digital Signatures [PDF]

open access: yes, 2020
This is just an overviewof the Digital Signaturetopic andthere are different types of encryption techniques are being used to ensure the privacy of data transmitted over the internet.Digital Signatureis a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity ofdigitalmessage/sender and non-repudiation of the ...
Jiang Zhang, Zhenfeng Zhang
  +4 more sources

Lattice‐based nominative signature using pseudorandom function

open access: yesIET Information Security, 2021
A nominative signature (NS) is a cryptographic primitive where two parties collude to produce a signature. It is a user certification system and has applications in a variety of sectors where nominee cannot trust heavily on the nominator to validate the ...
Meenakshi Kansal   +2 more
doaj   +1 more source

Security notions for stateful signature schemes

open access: yesIET Information Security, 2022
In some digital signature schemes, the signer needs to maintain a dynamic state while signing messages. These are called stateful signature schemes. Although stateful signature schemes are commonly used as cryptographic primitives, they do not fit the ...
Quan Yuan, Mehdi Tibouchi, Masayuki Abe
doaj   +1 more source

Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA)

open access: yesInternational Journal of Electronics and Communications Systems, 2021
The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document.
Asep Saepulrohman, Agus Ismangil
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy