{"title":"审查和改进数字签名模式","authors":"Ruohan Zhang","doi":"10.23977/iccia2020028","DOIUrl":null,"url":null,"abstract":"A digital signature scheme offers a cryptographic analogue of handwritten signatures that, in fact, provides much stronger security guarantees. Digital signatures serve as a powerful tool and are now accepted as legally binding in many countries; they can be used for certifying contracts or notarizing documents, for authentication of individuals or corporations, and as components of more complex protocols. Digital signatures also enable the secure distribution and transmission of public keys and thus, in a very real sense, serve as the foundation for all of public-key cryptography.[1] The paper introduces the representative examples of digital signature schemes: Lamport one-time digital signature, Batch signature schema and N-ary tree schema. Each schema with detailed mathematical explanations and analysis of its advantages and defects are presented below.","PeriodicalId":279965,"journal":{"name":"2020 4th International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2020)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reviewing and improving digital signature schemas\",\"authors\":\"Ruohan Zhang\",\"doi\":\"10.23977/iccia2020028\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A digital signature scheme offers a cryptographic analogue of handwritten signatures that, in fact, provides much stronger security guarantees. Digital signatures serve as a powerful tool and are now accepted as legally binding in many countries; they can be used for certifying contracts or notarizing documents, for authentication of individuals or corporations, and as components of more complex protocols. Digital signatures also enable the secure distribution and transmission of public keys and thus, in a very real sense, serve as the foundation for all of public-key cryptography.[1] The paper introduces the representative examples of digital signature schemes: Lamport one-time digital signature, Batch signature schema and N-ary tree schema. Each schema with detailed mathematical explanations and analysis of its advantages and defects are presented below.\",\"PeriodicalId\":279965,\"journal\":{\"name\":\"2020 4th International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2020)\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 4th International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2020)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23977/iccia2020028\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2020)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23977/iccia2020028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A digital signature scheme offers a cryptographic analogue of handwritten signatures that, in fact, provides much stronger security guarantees. Digital signatures serve as a powerful tool and are now accepted as legally binding in many countries; they can be used for certifying contracts or notarizing documents, for authentication of individuals or corporations, and as components of more complex protocols. Digital signatures also enable the secure distribution and transmission of public keys and thus, in a very real sense, serve as the foundation for all of public-key cryptography.[1] The paper introduces the representative examples of digital signature schemes: Lamport one-time digital signature, Batch signature schema and N-ary tree schema. Each schema with detailed mathematical explanations and analysis of its advantages and defects are presented below.