Results 11 to 20 of about 3,545,158 (344)
Non-conventional digital signatures and their implementations – A review [PDF]
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-19713-5_36The current technological scenario determines a profileration of trust domains, which are usually defined by validating the digital identity linked to each
E Fujisaki +6 more
core +3 more sources
One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys [PDF]
Quantum digital signatures (QDS), generating correlated bit strings among three remote parties for signatures through quantum law, can guarantee non-repudiation, authenticity, and integrity of messages. Recently, one-time universal hashing QDS framework,
Bing-Hong Li +6 more
semanticscholar +1 more source
Entanglement-based quantum digital signatures over a deployed campus network. [PDF]
The quantum digital signature protocol offers a replacement for most aspects of public-key digital signatures ubiquitous in today's digital world. A major advantage of a quantum-digital-signatures protocol is that it can have information-theoretic ...
Joseph C. Chapman +3 more
semanticscholar +1 more source
Efficient quantum digital signatures without symmetrization step. [PDF]
Quantum digital signatures (QDS) exploit quantum laws to guarantee non-repudiation, unforgeability and transferability of messages with information-theoretic security.
Yu-Shuo Lu +7 more
semanticscholar +1 more source
Digital Signature Legality And Evidence In Trials
Currently, the dynamics of Indonesian society are at the growing industrial and information society stage in which one example is the presence of the digital signature. Indonesia has not yet familiar with legislation concerning digital signatures.
Devi Cintiya Ramadhanti +1 more
doaj +1 more source
Twin-field quantum digital signatures. [PDF]
Digital signature is a key technique in information security, especially for identity authentications. Compared to classical correspondence, quantum digital signatures (QDSs) provide a considerably higher level of security. At present, its performance is
Chunhui Zhang +4 more
semanticscholar +1 more source
This is just an overviewof the Digital Signaturetopic andthere are different types of encryption techniques are being used to ensure the privacy of data transmitted over the internet.Digital Signatureis a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity ofdigitalmessage/sender and non-repudiation of the ...
Jiang Zhang, Zhenfeng Zhang
+4 more sources
Lattice‐based nominative signature using pseudorandom function
A nominative signature (NS) is a cryptographic primitive where two parties collude to produce a signature. It is a user certification system and has applications in a variety of sectors where nominee cannot trust heavily on the nominator to validate the ...
Meenakshi Kansal +2 more
doaj +1 more source
Security notions for stateful signature schemes
In some digital signature schemes, the signer needs to maintain a dynamic state while signing messages. These are called stateful signature schemes. Although stateful signature schemes are commonly used as cryptographic primitives, they do not fit the ...
Quan Yuan, Mehdi Tibouchi, Masayuki Abe
doaj +1 more source
The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document.
Asep Saepulrohman, Agus Ismangil
semanticscholar +1 more source

