A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
The History of Subliminal Channels
Proceedings of the First International Workshop on Information Hiding
Hi-index | 0.00 |
Digital signatures, according to the International Organization for Standardization, "establish the origin of a message in order to settle disputes of what message (if any) was sent," They typically involve two keys-- a signing key which is private to a user, and a signature verification key which is made public. A user can operate on a message with the private signing key to generate a signature, a short string that depends on all the bits in the message and the signing key in such a way that it cannot economically be forged by someone who does not know the signing key; yet it can be verified by anyone with the public verification key.