Skip to main content

Research and Application of Arbitration Digital Signature Scheme Based on Hybrid Cryptosystem in e-Government

  • Conference paper
Pervasive Computing and the Networked World (ICPCA/SWS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8351))

  • 3040 Accesses

Abstract

Digital Technology has provided a guarantee for information security. It is wide used in the confidential communications of e-Government management. This paper focused on how to make the authentication of communication members efficient and reliable. Here we proposed a hybrid digital signature to implement this issue. Here in this paper, we discussed the proposal reasons and the working principles, including options of AES and ECC, and key distribution methods. Finally, we proposed the application model of this scheme used in confidential communication, and described the theoretical correctness. It can efficiently improve the security of the information transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mei-Lin, S., Yong, X.: The theory and application of Computer Supported Cooperative Work. The Publishing House of Electronic Industry, Beijing (2000)

    Google Scholar 

  2. Stallings, W.: Cryptography and Network Security:Principles and Practices, 3rd edn. The Publishing House of Electronic Industry, Beijing (2004)

    Google Scholar 

  3. Akl, S.G.: Digital Signatures: A Tutorial Survey. IEEE Computer (February 1983)

    Google Scholar 

  4. Mitchell, C., Piper, F., Wild, P.: Digital Signatures. In: [SIMM92a]

    Google Scholar 

  5. Xu, Q.-L., Li, D.-X.: Elliptic curve cryptosystem. Journal of Computer Research & Development 36(11) (November 1999)

    Google Scholar 

  6. Qi-Zhi, Q., Qian-Xing, X.: The Research on Elliptic Curve Cryptography. In: The 8th International Conference on Computer Supported Cooperative Work in Design Proceedings, The Publishing House of Worlds’Books, Beijing (2004)

    Google Scholar 

  7. Zhi-Guang, Q.: Cryptography Algorithm-Survey and Trends. Computer Applications 24(2)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhao, S., Wei, R., Yang, Z. (2014). Research and Application of Arbitration Digital Signature Scheme Based on Hybrid Cryptosystem in e-Government. In: Zu, Q., Vargas-Vera, M., Hu, B. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2013. Lecture Notes in Computer Science, vol 8351. Springer, Cham. https://doi.org/10.1007/978-3-319-09265-2_85

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09265-2_85

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09264-5

  • Online ISBN: 978-3-319-09265-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics