Proceedings of the 2017 International Conference on Education and Technology (2017 ICEduTech) 2018
DOI: 10.2991/icedutech-17.2018.34
|View full text |Cite
|
Sign up to set email alerts
|

Digital Signature Security in Data Communication

Abstract: Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution where the authenticity of the message will be verified to prove that the received message is the original message witho… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Nikooghadam and Amintoosi [16] demonstrated the weaknesses of the protocol in [15], as it is vulnerable to known session-specific temporary information attack and is not able to provide perfect forward secrecy. Rahim et al [17] applied the Ong-Schnorr-Shamir (OSS) subliminal channel scheme in securing data communication, which is a cryptographic method and supports verification based on the OSS digital signature scheme. Depending on OSS, as the basic signature algorithm is no longer possible, Pollard and Schnorr [18] presented an efficacious solution to solve the quadratic equation x 2 + ky 2 = m mod n. Their technique succeeded in obtaining the signature without any knowledge about the private key.…”
Section: Related Workmentioning
confidence: 99%
“…Nikooghadam and Amintoosi [16] demonstrated the weaknesses of the protocol in [15], as it is vulnerable to known session-specific temporary information attack and is not able to provide perfect forward secrecy. Rahim et al [17] applied the Ong-Schnorr-Shamir (OSS) subliminal channel scheme in securing data communication, which is a cryptographic method and supports verification based on the OSS digital signature scheme. Depending on OSS, as the basic signature algorithm is no longer possible, Pollard and Schnorr [18] presented an efficacious solution to solve the quadratic equation x 2 + ky 2 = m mod n. Their technique succeeded in obtaining the signature without any knowledge about the private key.…”
Section: Related Workmentioning
confidence: 99%