منابع مشابه
Easing PAIN with Digital Signatures
Different forms of encryption techniques are being used to ensure privacy of data transmitted over Internet. Digital signature which uses Public Key Encryption (PKE) ensures privacy of conversation, integrity of data, authenticity of sender and non-repudiation of sender. Several applications on desktops, mobiles and other devices use it to secure data of various applications, services and acces...
متن کاملDigital Signatures with Minimal Overhead
In a digital signature scheme with message recovery, rather than transmitting the message m and its signature σ, a single enhanced signature τ is transmitted. The verifier is able to recover m from τ and at the same time verify its authenticity. The two most important parameters of such a scheme are its security and the overhead |τ | − |m|. A simple argument shows that for any scheme with “n bi...
متن کاملProblem 1 : Fun with Digital Signatures
Scheme 2: Σ(M) = (σ(1 ◦m1), σ(2 ◦m2), . . . , σ(n ◦mn)), where each index i is represented using dlog2(n+ 1)e bits. 3. Choose the smallest n such that d2 log2(n+ 1) + |M | n e ≤ k. (Assume that |M | is small enough and k is large enough to make this is possible.) Then break M up into M = m1 ◦ . . . ◦mn, where each mi is such that |mi| = k − d2log2(n+ 1)e, and mn is padded with 0s as necessary. ...
متن کاملMatrix Signatures: From MACs to Digital Signatures
We present the first general implementation to provide the properties of digital signature using MACs in a system consisting of any number of untrusted clients and n servers, up to f of which are Byzantine. At the heart of the implementation is a novel matrix signature that captures the collective knowledge of the servers about the authenticity of a message. Matrix signatures can be generated o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2011
ISSN: 0975-8887
DOI: 10.5120/3533-4822