Security

New Digital Signature Protocol Based on Elliptic Curves

Free registration required

Executive Summary

A lot of practical algorithms for digital signature have been developed since the invention of the public key cryptography in the late 1970's. Let them recall the principle of these methods. The signer Alice needs to possess two kinds of keys. The first one is private, must be kept secret and stored only locally. The second is public and must be largely diffused to be accessible to the other users. If Alice wishes to sign a particular message, a contract or a will, she has to give the solutions of a hard mathematical equation depending of and of her public key.

  • Format: PDF
  • Size: 375.5 KB