We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Survey on Techniques Developed using Digital Signature: Public key Cryptography

by Shivendra Singh, Md. Sarfaraz Iqbal, Arunima Jaiswal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 16
Year of Publication: 2015
Authors: Shivendra Singh, Md. Sarfaraz Iqbal, Arunima Jaiswal
10.5120/20635-3272

Shivendra Singh, Md. Sarfaraz Iqbal, Arunima Jaiswal . Survey on Techniques Developed using Digital Signature: Public key Cryptography. International Journal of Computer Applications. 117, 16 ( May 2015), 1-4. DOI=10.5120/20635-3272

@article{ 10.5120/20635-3272,
author = { Shivendra Singh, Md. Sarfaraz Iqbal, Arunima Jaiswal },
title = { Survey on Techniques Developed using Digital Signature: Public key Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 16 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number16/20635-3272/ },
doi = { 10.5120/20635-3272 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:30.729868+05:30
%A Shivendra Singh
%A Md. Sarfaraz Iqbal
%A Arunima Jaiswal
%T Survey on Techniques Developed using Digital Signature: Public key Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 16
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the originator's identity. Digital signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. This architecture is related with secure Hash Function and cryptographic algorithm In this paper we are going to make review about all those technique that are developed within last 5-10 years. And which are developed with the help of digital signature and based on public key cryptography. These techniques provides a better platform for security of data using cryptography.

References
  1. A New Efficient Digital Signature Scheme Algorithm based on Block cipher by Prakash Kuppuswamy, Peer Mohammad Appa,Dr. Saeed Q Y Al-Khalidi, IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52
  2. XML Digital Signature and its Role in Information System Security by Sandro Geri?, Tomislav Vida?i?, MIPRO 2012, May 21-25,2012, Opatija, Croatia.
  3. On Functionality Extension of the Digital Signature Standards by Minh H. Nguyen, Duy N. HOi, Dung H. Luu, Alexander A. Moldovyan, and Nikolay A. Moldovyan, 2011 International Conference on Advanced Technologies for Communications (ATC 2011).
  4. The Improvement of digital signature algorithm Based on elliptic curve cryptography by Qiuxia Zhang , Zhan Li , Chao Song, 978-1-4577-0536-6/11/$26. 00 ©2011 IEEE
  5. Comparison Research on Digital Signature Algorithms in Mobile Web Services by Zuguang Xuan, Zhenjun Du, Rong Chen, partially supported by National Natural Science Foundation of China (No. 60775028), Dalian Science & Technology Program (No. 2007A14GX042) and Dalian Maritime University Youth Foundation (DLMU-ZL-200803), 978-1-4244-4639-1/09/$25. 00 ©2009 IEEE
  6. Design of Hyper Elliptic Curve Digital Signature by Deng Jian-zhi, Cheng Xiao-hui, Gui Qiong, 2009 International Conference on Information Technology and Computer Science.
  7. A New Conic Curve Digital Signature Scheme by Xiang Can, You Lin, 2009 Fifth International Conference on Information Assurance and Security.
  8. Digital Signature Algorithm Based on Hash Round Function and Self-certified Public Key System by Chen Hai-peng, Shen Xuan-jing, Wei Wei, 2009 First International Workshop on Education Technology and Computer Science.
  9. Digital Signature on Mobile Devices based on Location by Santi Jarusombat and Surin Kittitornkun, 0-7803-9740-X/06/$20. 00 © 2006 IEEE.
  10. Group-oriented (t, n) threshold digital signature scheme and digital multi signature by L. Harn, IEE Proc. -Comput. Digit. Tech. , Vol. 141, No. 5, September 1994.
  11. Supporting Digital Signatures in Mobile Environments by Scott Campbell, Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'03) 1080-1383/03 $17. 00 © 2003 IEEE.
  12. Digital signature signing engine to protect the integrity of digital assets by Gordon W. Romney, 1-4244-0406-1/06/$20. 00 ©2006 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Signature Public key Cryptography Block cipher MD5 Security arguments XML signatures DSA HEC GPS Geo-encryption.