1983
DOI: 10.1145/357980.358017
|View full text |Cite
|
Sign up to set email alerts
|

A method for obtaining digital signatures and public-key cryptosystems

Abstract: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be "signed" using a privately held decrypti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
439
0
12

Year Published

2000
2000
2017
2017

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 3,814 publications
(451 citation statements)
references
References 12 publications
0
439
0
12
Order By: Relevance
“…This will increase the number of computations which in turn increases power consumption. The most widely known example of such a cryptosystem is RSA [36].…”
Section: Hardware Requirements Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…This will increase the number of computations which in turn increases power consumption. The most widely known example of such a cryptosystem is RSA [36].…”
Section: Hardware Requirements Analysismentioning
confidence: 99%
“…This will increase the number of computations which in turn increases power consumption. The most widely known example of such a cryptosystem is RSA [36].In the case of larger IMDs, we can assume them to have their own power source designed to last for significant amount of time, up to several years. This gives the possibility of using more robust protocols for increased security.…”
mentioning
confidence: 99%
“…Elliptic Curve Cryptosystem (ECC), which was originally proposed by Niel Koblitz andVictor Miller in 1985 (Koblitz, 1987;Miller, 1986), is seen as a serious alternative to RSA (Rivest et al, 1978) with much shorter key size. ECC with key size of 128-256 bits is shown to offer equal security to that of RSA with key size of 1-2K bits.…”
Section: Elliptic Curve Cryptosystemsmentioning
confidence: 99%
“…ECCs have gained popularity for cryptographic applications because of the short key compared with earlier public key cryptosystems such as RSA (Rivest et al, 1978) and ElGamal (ElGamal, 1985 …”
Section: Elliptic Curve Cryptosystemsmentioning
confidence: 99%
“…An algorithm described by Ronald Rivest, Adi Shamir and Leonard Adleman or commonly known as RSA [9] is the pioneer in brand-new asymmetric-key cryptography, used mainly to consolidate key-agreement protocol. Together with lengthy secret key, the former utilizes substitutionpermutation network which creates confusion and diffusion for secure cryptography, whereas the later makes use of infeasibility to factor large numbers in retrieving key via classical computer for the same purpose [10].…”
Section: Introductionmentioning
confidence: 99%