Integrating Diffie–Hellman Key Exchange into the Digital Signature Algorithm (DSA)

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of Proxy Signature in the Digital Signature Algorithm (DSA)

The use of proxy signature has attracted considerable attention and has been deployed in many applications. Unfortunately, most of the proxy signature schemes, which have been proposed up to now, are not based on standard signature such as Digital Signature Algorithm (DSA). Consequently, those proposals have inevitably been considered infeasible because of obvious security weaknesses so they su...

متن کامل

Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)

This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security...

متن کامل

The Korean Certiicate-based Digital Signature Algorithm

As a contribution to IEEE P1363a, we propose a provably secure digital signature algorithm called the Korean Certiicate-based Digital Signature Algorithm (KCDSA, in short) and its elliptic curve variant (EC-KCDSA). We believe that the proposed signature schemes are more advantageous than DSA/EC-DSA in both security and ee-ciency. No patent related with KCDSA/EC-KCDSA has been submitted, and the...

متن کامل

On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks

In the ordinary security model for signature schemes, we consider an adversary that may forge a signature on a new message using only his knowledge of other valid message and signature pairs. To take into account side channel attacks such as tampering or fault-injection attacks, Bellare and Kohno (Eurocrypt 2003) formalized related-key attacks (RKA), where stronger adversaries are considered. I...

متن کامل

DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System

Many RFCs, but not all, are Proposed Standards, Draft Standards, or Standards. Since the status of these RFCs may change during the standards processing, we note here only that they are on the standards track. Please see the latest edition of "Internet Official Protocol Standards" for the current state and status of these RFCs. In the following, RFCs on the standards track are marked [STANDARDS...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Communications Letters

سال: 2004

ISSN: 1089-7798

DOI: 10.1109/lcomm.2004.825705