Skip to main content

A Design and Realization of Digital Signature of E-government Management Website Group Based on Elgamal Cipher System

  • Conference paper
Pervasive Computing and the Networked World (ICPCA/SWS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8351))

  • 3047 Accesses

Abstract

E-government system is complicated system which involves technology and management problems. The technology problem includes many aspects, such as physical layer, network layer, system layer and application layer. Because of different properties different safety precautions are used, such as firewall technology in network layer and antivirus s techniques in system layer. In order to solve the information safety problem in application level this paper design and realize a digital signature of e-government management website group scheme based on Elgamal cipher system by digital signature technology to make sure the privacy, integrity and non-repudiation in e-government information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weike, M.: E-commerce and network notary. Information-Gathering Magazine 9, 113–115 (2004)

    Google Scholar 

  2. Han, K., Zhang, E., Kim, J., et al.: A Secure Testament Revealing protocol. In: SCIS (2003)

    Google Scholar 

  3. Tou, W.: About the preservation of electronic evidence notary. China Notary 10, 63–69 (2004)

    Google Scholar 

  4. Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  5. Choi, C.-J., Kim, Z., Kim, K.: Schnorr Signature Scheme with Restrieted Signing Capability and Its Applieation. In: Computer Seeurity Symposium (2003)

    Google Scholar 

  6. Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  7. Jiang, L., Zhen, Y.: Notarization in electronic contract risk control application. Journal of Chongqing College of Post and Telecom (Social Science Edition) 60(2), 73–75 (2004)

    Google Scholar 

  8. Yuanmin, Z., Zhibin, Y.: On the notarized electronic contract value. Journal of Beijing Institute of Technology (2), 16–20 (2002)

    Google Scholar 

  9. Chu, Z.: Network notarized the importance of the development of e-commerce. Electronic Commerce 7, 64–65 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Bing, H., Bo, W., Hui, Z. (2014). A Design and Realization of Digital Signature of E-government Management Website Group Based on Elgamal Cipher System. In: Zu, Q., Vargas-Vera, M., Hu, B. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2013. Lecture Notes in Computer Science, vol 8351. Springer, Cham. https://doi.org/10.1007/978-3-319-09265-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09265-2_16

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09264-5

  • Online ISBN: 978-3-319-09265-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics