skip to main content
10.1145/3452940.3453066acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
short-paper

The Application of Digital Signature Technology in PKI

Published: 17 May 2021 Publication History

Abstract

This thesis introduces the digital signature technology involved in PKI. First, we introduces two important concepts of public key cryptosystem and trapdoor function related to digital signature. Then we explains the conditions that the digital signature scheme should meet, gives the basic idea and mathematical description of the digital signature scheme, and analyzes the two classic digital signature algorithms, RSA and DSA, and introduces the methods for these two digital signature algorithms. Finally, we use some attacks to further prove the universality of the mathematical description of digital signature schemes, and summarize several commonly used digital signature schemes.

References

[1]
Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644--654.
[2]
G.R. Blakley, I. Borosh, Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages, Computers & Mathematics with Applications, Volume 5, Issue 3, 1979, Pages 169--178.
[3]
Kravitz D W. Digital signature algorithm: U.S. Patent 5, 231, 668[P]. 1993-7-27.
[4]
Chaum D, Van Antwerpen H. Undeniable signatures[C]//Conference on the Theory and Application of Cryptology. Springer, New York, NY, 1989: 212--216.
[5]
Zeng Na, Yu Min. A zero-knowledge undeniable digital signature algorithm[J]. Network Security Technology and Application, 2008(04):94--95. (in Chinese)
[6]
Chang C H, Zhang L. A blind dynamic fingerprinting technique for sequential circuit intellectual property protection[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2013, 33(1): 76--89.
[7]
Chaum, David; van Heyst, Eugene. Group signatures (PDF). Lecture Notes in Computer Science 547: 257--265. 1991.
[8]
Kupiec J, Pedersen J, Chen F. A trainable document summarizer[C]//Proceedings of the 18th annual international ACM SIGIR conference on Research and development in information retrieval. 1995: 68--73.
[9]
Camenisch J, Stadler M. Efficient group signature schemes for large groups[C]//Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1997: 410--424.
[10]
Gordon S D, Katz J, Vaikuntanathan V. A group signature scheme from lattice assumptions[C]//International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2010: 395--412.
[11]
Camenisch J, Neven G, Rückert M. Fully anonymous attribute tokens from lattices[C]//International Conference on Security and Cryptography for Networks. Springer, Berlin, Heidelberg, 2012: 57--75.
[12]
Ling S, Nguyen K, Wang H. Group signatures from lattices: simpler, tighter, shorter, ring-based[C]//IACR International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, 2015: 427--449.
[13]
Libert B, Ling S, Mouhartem F, et al. Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions[C]//International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2016: 373--403.
[14]
Sun Y, Liu Y, Wu B. An efficient full dynamic group signature scheme over ring[J]. Cybersecurity, 2019, 2(1): 21.

Cited By

View all
  • (2024)LB-CLAS: Lattice-Based Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for VANETVehicular Communications10.1016/j.vehcom.2024.100843(100843)Online publication date: Sep-2024
  • (2024)CLLS: Efficient certificateless lattice-based signature in VANETsComputer Networks10.1016/j.comnet.2024.110858255(110858)Online publication date: Dec-2024
  • (2023)SIGNIN: The Digital Signature and File Verification Management Application Using Secure Rapid Application Development Approach2023 International Conference on Information Technology and Computing (ICITCOM)10.1109/ICITCOM60176.2023.10442845(273-278)Online publication date: 1-Dec-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICITEE '20: Proceedings of the 3rd International Conference on Information Technologies and Electrical Engineering
December 2020
687 pages
ISBN:9781450388665
DOI:10.1145/3452940
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 May 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cryptography
  2. Digital signature
  3. Hash function
  4. Public key cryptography
  5. Public key infrastructure

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Funding Sources

  • ?????????PKI??????Application of elliptic curve cipher algorithm in PKI study
  • ?????? ECC ?????????A Study on Digital Signature Algorithm Based on Elliptic Curve ECC

Conference

ICITEE2020

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)1
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)LB-CLAS: Lattice-Based Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for VANETVehicular Communications10.1016/j.vehcom.2024.100843(100843)Online publication date: Sep-2024
  • (2024)CLLS: Efficient certificateless lattice-based signature in VANETsComputer Networks10.1016/j.comnet.2024.110858255(110858)Online publication date: Dec-2024
  • (2023)SIGNIN: The Digital Signature and File Verification Management Application Using Secure Rapid Application Development Approach2023 International Conference on Information Technology and Computing (ICITCOM)10.1109/ICITCOM60176.2023.10442845(273-278)Online publication date: 1-Dec-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media