A review of digital signature Schemes, Based on Asymmetric cryptography and their applications
AbstractDue to the rapid growth of online interactions on the Internet, security services such as authentication, non-repudiation, integrity and Confidentiality are very essential security requirements for a secure transaction. Information encryption is one of the most important ways to protect information in cyberspace. To achieve these goals, digital signature is the most efficient tool that uses cryptography. In this paper, we conduct a comprehensive study of these digital signature schemes based on the RSA, DSA and ECDSA encryption schemes and their improved versions and compare them. In this paper checked out a review of digital signature Schemes, Based on Asymmetric cryptography and their applications.
- حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران میشود.
- پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانههای چاپی و دیجیتال را به کاربر نمیدهد.