Education, Science, Technology, Innovation and Life
Open Access
Sign In

Reviewing and improving digital signature schemas

Download as PDF

DOI: 10.23977/ICCIA2020028

Author(s)

Ruohan Zhang

Corresponding Author

Ruohan Zhang

ABSTRACT

A digital signature scheme offers a cryptographic analogue of handwritten signatures that, in fact, provides much stronger security guarantees. Digital signatures serve as a powerful tool and are now accepted as legally binding in many countries; they can be used for certifying contracts or notarizing documents, for authentication of individuals or corporations, and as components of more complex protocols. Digital signatures also enable the secure distribution and transmission of public keys and thus, in a very real sense, serve as the foundation for all of public-key cryptography.[1] The paper introduces the representative examples of digital signature schemes: Lamport one-time digital signature, Batch signature schema and N-ary tree schema. Each schema with detailed mathematical explanations and analysis of its advantages and defects are presented below.

KEYWORDS

Digital signature; Lamport one-time digital signature; Batch signature schema; N-ary tree schema

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.