Abstract
Digital Technology has provided a guarantee for information security. It is wide used in the confidential communications of e-Government management. This paper focused on how to make the authentication of communication members efficient and reliable. Here we proposed a hybrid digital signature to implement this issue. Here in this paper, we discussed the proposal reasons and the working principles, including options of AES and ECC, and key distribution methods. Finally, we proposed the application model of this scheme used in confidential communication, and described the theoretical correctness. It can efficiently improve the security of the information transmission.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mei-Lin, S., Yong, X.: The theory and application of Computer Supported Cooperative Work. The Publishing House of Electronic Industry, Beijing (2000)
Stallings, W.: Cryptography and Network Security:Principles and Practices, 3rd edn. The Publishing House of Electronic Industry, Beijing (2004)
Akl, S.G.: Digital Signatures: A Tutorial Survey. IEEE Computer (February 1983)
Mitchell, C., Piper, F., Wild, P.: Digital Signatures. In: [SIMM92a]
Xu, Q.-L., Li, D.-X.: Elliptic curve cryptosystem. Journal of Computer Research & Development 36(11) (November 1999)
Qi-Zhi, Q., Qian-Xing, X.: The Research on Elliptic Curve Cryptography. In: The 8th International Conference on Computer Supported Cooperative Work in Design Proceedings, The Publishing House of Worlds’Books, Beijing (2004)
Zhi-Guang, Q.: Cryptography Algorithm-Survey and Trends. Computer Applications 24(2)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhao, S., Wei, R., Yang, Z. (2014). Research and Application of Arbitration Digital Signature Scheme Based on Hybrid Cryptosystem in e-Government. In: Zu, Q., Vargas-Vera, M., Hu, B. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2013. Lecture Notes in Computer Science, vol 8351. Springer, Cham. https://doi.org/10.1007/978-3-319-09265-2_85
Download citation
DOI: https://doi.org/10.1007/978-3-319-09265-2_85
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09264-5
Online ISBN: 978-3-319-09265-2
eBook Packages: Computer ScienceComputer Science (R0)