Abstract
A practical digital signature system based on a conventional encryption function which is as secure as the conventional encryption function is described. Since certified conventional systems are available it can be implemented quickly, without the several years delay required for certification of an untested system.
(Subtitle: That Antique Paper from 1979)
This work was partially supported under contracts F49620-78-C-0086 from the U.S. Air Force Office of Scientific Research and DAAG29-78-C-0036 from the U.S. Army Research Office. Much of this work was done when the author was at Stanford University in the Electrical Engineering Department, and some was done when the author was at BNR in Palo Alto.
Chapter PDF
Similar content being viewed by others
Key Words and Phrases
Bibliography
Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. on Inform. IT-22,6(Nov. 1976), 644–654.
Evans A., Kantrowitz, W., and Weiss, E. A user authentication system not requiring secrecy in the computer. Comm. ACM 17,8(Aug. 1974), 437–442.
Kohnfelder, L.M. Using certificates for key distribution in a public-key cryptosystem. Private communication.
Lipton, S.M., and Matyas, S.M. Making the digital signature legal-and safeguarded. Data Communications (Feb. 1978), 41–52.
McEliece, R.J. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, JPL, (Jan. and Feb. 1978), 42–44.
Merkle, R. Secure Communications over Insecure Channels. Comm. ACM 21,4(Apr. 1978), 294–299.
Merkle, R., and Hellman, M. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. on Inform. IT-24,5(Sept. 1978), 525–530.
Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21,2(Feb. 1978), 120–126.
Wilkes, M.V., Time-Sharing Computer Systems. Elsevier, New York, 1972.
Lamport, L., Constructing digital signatures from a one way function. SRI Intl. CSL-98
Feistel, H., Cryptography and computer security. Scientific American, 228(May 1973), 15–23.
Shannon, C.E., Communication theory of secrecy systems. Bell Sys. Tech. Jour. 28(Oct. 1949) 656–715.
Rabin, M.O., Digitalized signatures. In Foundations of Secure Computation, R. Lipton and R. DeMillo, Eds., Academic Press, New York, 1978, pp. 155–166.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Merkle, R.C. (1990). A Certified Digital Signature. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_21
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_21
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive