Nothing Special   »   [go: up one dir, main page]

Skip to main content

Digital Signatures

  • Reference work entry
  • First Online:
Encyclopedia of Database Systems

Synonyms

Signatures

Definition

In general, given a message M, the digital signature of M generated by a signer S is a bit string univocally bound to M and some secret key known only by S. In practice, since digital signature schemes are based on asymmetric cryptography, the digital signature of M generated by S is a bit string dependent on M and the private key of S. Digital signature schemes have the property that signatures generated with a private key can be validated only by the corresponding public key. This ensures the authenticity of the message. Moreover, any modification on the signed message will invalidate the signature itself. This means that if the signature is validated it provides an evidence that the message has not been altered after the digital signature has been applied on it. This ensures the integrity of the message.

Historical Background

The notion of digital signature appeared in 1976 in a paper by Diffie and Hellman [1], where it has been introduced, for the...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory. 1976;IT-22(6):644–54.

    Article  MathSciNet  MATH  Google Scholar 

  2. Jonsson J, Kaliski B. Public-Key Cryptography Standards (PKCS) No. 1: RSA Cryptography. Request for Comments 3447, Feb 2003.

    Google Scholar 

  3. Kravitz DW. Digital signature algorithm. 1993. U.S. Patent No. 5, 231, 668.

    Google Scholar 

  4. Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of applied cryptography. CRC; 1996.

    Google Scholar 

  5. Ntional Institute of Standards and Technology. Secure Hash Standard. Federal Information Processing Standards Publication, FIPS 180–1, 1995.

    Google Scholar 

  6. National Institute of Standards and Technology. Digital Signature Standard (DSS). Federal Information Processing Standards Publication, FIPS 186–2, 2000.

    Google Scholar 

  7. Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120–6.

    Article  MathSciNet  MATH  Google Scholar 

  8. World Wide Web Consortium. XML-Signature Syntax and Processing. W3C Recommendation, 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Barbara Carminati .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Carminati, B. (2018). Digital Signatures. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_131

Download citation

Publish with us

Policies and ethics