Related Concepts
Definition
Digital signature schemes are techniques to assure an entity’s acknowledgment of having seen a certain digital message. Typically, an entity has a private key and a corresponding public key that is tied to the entity’s name (Public Keyinfrastructure). The entity generates a string called signature, which depends on the message to sign and his private key.
The fact that the entity acknowledged, that is, that he signed the message, can be verified by anyone using the entity’s public key, the message, and the signature. Data Authentication and signature schemes are sometimes distinguished in the sense that in the latter, verification can be done by anyone at any time after the generation of the signature. Due to this property, the digital signature scheme achieves Non-Repudiation property, that is, a signer cannot later deny the fact of signing.
Some examples of digital signature schemes are RSA...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Goldwasser S, Micali S, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2):281–308
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Sako, K. (2011). Digital Signature Schemes. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_17
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_17
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering