Digital Signature Security in Data Communication

11/06/2018
by   Robbi Rahim, et al.
0

Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution where the authenticity of the message will be verified to prove that the received message is the original message without any change, Ong-Schnorr-Shamir is the algorithm are used in this research and the experiment are perform on the digital signature scheme and the hidden channel scheme.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/20/2022

A t-out-of-n Redactable Signature Scheme

A redactable signature scheme allows removing parts of a signed message ...
research
07/27/2021

Practical quantum multiparty signatures using quantum key distribution networks

Digital signatures are widely used for providing security of communicati...
research
11/21/2020

Non-Repudiation for VoIP Communication in UMTS and LTE Networks

This thesis work presents an architectural design of a system to bring n...
research
09/20/2023

Tropical cryptography III: digital signatures

We use tropical algebras as platforms for a very efficient digital signa...
research
09/25/2020

Signing Information in the Quantum Era

Signatures are primarily used as a mark of authenticity, to demonstrate ...
research
08/31/2020

APVAS: Reducing Memory Size of AS_PATH Validation by Using Aggregate Signatures

The BGPsec protocol, which is an extension of the border gateway protoco...
research
03/29/2022

The root extraction problem in braid group-based cryptography

The root extraction problem in braid groups is the following: given a br...

Please sign up or login with your details

Forgot password? Click here to reset