Education, Science, Technology, Innovation and Life
Open Access
Sign In

Application of Mathematical Signature Technology in Computer Information Security Design

Download as PDF

DOI: 10.23977/jsoce.2021.030718 | Downloads: 6 | Views: 931

Author(s)

Yongqiang Shang 1

Affiliation(s)

1 Xinyang Agriculture and Forestry University, Department of Information Engineering Information Engineering Department, Xinyang, Hennan, 464000, China

Corresponding Author

Yongqiang Shang

ABSTRACT

Digital signature technology is an effective means to ensure the confidentiality, integrity and security of information transmission, and it plays an important role in computer security protection. Based on this, this paper analyzes the application of digital signature technology in computer security protection in detail.

KEYWORDS

Computer network, Security protection, Digital signature technology

CITE THIS PAPER

Yongqiang Shang. Application of Mathematical Signature Technology in Computer Information Security Design. Journal of Sociology and Ethnology (2021) 3: 93-96. DOI: http://dx.doi.org/10.23977/jsoce.2021.030718.

REFERENCES

[1] Xu Danhui. Design and analysis of designated verifier signature scheme [D]. Tianjin: Tianjin University of technology, 2015.
[2] Du Chengbin. Design and analysis of quantum proxy multiple blind signature protocol [D]. Anhui: Anhui University, 2017.
[3] Yao Hongdi. Research on quantum multi proxy signature protocol [D]. Anhui: Anhui University, 2017.
[4] Li shangze. Improvement and application of scalar multiplication algorithm of elliptic curve [D]. Beijing: Beijing University of chemical technology, 2017.
[5] Liu le. Two types of signature scheme design and related issues research [D]. Shaanxi: Xi'an University of Electronic Science and technology, 2017.
[6] Zhang Jun. a quantum proxy signature scheme based on EPR entangled state [J]. Telecommunication science, 2012,28 (11): 92-97.
[7] Li Fei, Gao Wei, Wang Guilin, et al. General construction of compact security signature based on the hash function of strong chameleon [J]. Computer research and development, 2017,54 (10): 2244-2254.
[8] Zhou Xufeng. The impact of quantum informatics on information security [J]. Value engineering, 2015, 34 (33): 192-195.

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.