Digital Signatures in Digital Communications: A Review
DOI:
https://doi.org/10.5281/zenodo.7920995Keywords:
Digital Signature, Public Key Cryptography, Security Patches, Authenticity, Hash FunctionAbstract
Nowadays data sharing over the internet is a major and critical issue due to security problems. So more security mechanisms are required to protect the data while sharing through an unsecured channel. Open network transactions of messages be they of any kind demands the digital signature technique. Being one of the most important developments in public key cryptography, the digital signature provides a collection of security patches that help in providing at most authenticity and security. The digital signature is related to the secure Hash function. In this paper, we have reviewed the most recent and efficient Digital signature algorithms in digital communications and summarized the respective gaps.
References
Ma, R., & Du, L. (2022). Efficient Pairing-Free Attribute-Based Blind Signature Scheme Based on Ordered Binary Decision Diagram. IEEE Access, 10, 114393-114401.
Alpizar-Chacon, I., & Chacon-Rivas, M. (2016, October). Authenticity and versioning of learning objects using the digital signature infrastructure of Costa Rica. In 2016 XI Latin American Conference on Learning Objects and Technology (LACLO) (pp. 1-6). IEEE.
Jianhong, Z., Hua, C., Shengnan, G., & Qin, G. (2009, May). Comment on a digital signature scheme with using self-certified public keys. In 2009 International Forum on Information Technology and Applications (Vol. 3, pp. 678-680). IEEE.
Rahmawati, E., Listyasari, M., Aziz, A. S., Sukaridhoto, S., Damastuti, F. A., Bachtiar, M. M., & Sudarsono, A. (2017, September). Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone. In 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA) (pp. 234-238). IEEE.
Dai, W., Parker, T. P., Jin, H., & Xu, S. (2012). Enhancing data trustworthiness via assured digital signing. IEEE Transactions on Dependable and Secure Computing, 9(6), 838-851.
Saha, G. (2017, April). Dsign digital signature system for paperless operation. In 2017 International Conference on Communication and Signal Processing (ICCSP) (pp. 0324-0328). IEEE.
Shukla, S. S. P., Singh, S. P., Shah, K., & Kumar, A. (2012, March). Enhancing security & integrity of data using watermarking & digital signature. In 2012 1st International Conference on Recent Advances in Information Technology (RAIT) (pp. 28-32). IEEE.
Chakraborty, N. R., Rahman, M. T., Rahman, M. E., & Uddin, M. S. (2016, December). Generation and verification of digital signature with two factor authentication. In 2016 International Workshop on Computational Intelligence (IWCI) (pp. 131-135). IEEE.
Lakmal, C., Dangalla, S., Herath, C., Wickramarathna, C., Dias, G., & Fernando, S. (2017, September). IDStack—the common protocol for document verification built on digital signatures. In 2017 National Information Technology Conference (NITC) (pp. 96-99). IEEE.
Harn, L., & Ren, J. (2011). Generalized digital certificate for user authentication and key establishment for secure communications. IEEE Transactions on Wireless Communications, 10(7), 2372-2379.
Malik, M. I., Ahmed, S., Dengel, A., & Liwicki, M. (2012, March). A signature verification framework for digital pen applications. In 2012 10th IAPR International Workshop on Document Analysis Systems (pp. 419-423). IEEE.
Sadikin, M. A., & Sunaringtyas, S. U. (2016, August). Implementing digital signature for the secure electronic prescription using QR-code based on android smartphone. In 2016 International Seminar on Application for Technology of Information and Communication (ISemantic) (pp. 306-311). IEEE.
Kim, Y., Han, J., Seo, D., & Sohn, S. (2005). U.S. Patent Application No. 10/836,928.
Guan, D. J., Zhuang, E. S., Chung, I. C., & Lin, Y. S. (2017, August). Performance analysis of some batch verification methods of digital signatures. In 2017 12th Asia Joint Conference on Information Security (AsiaJCIS) (pp. 10-14). IEEE.
Huang, Y. L., Lin, C. H., & Leu, F. Y. (2011, June). Verification of a batch of bad signatures by using the matrix-detection algorithm. In 2011 First International Conference on Data Compression, Communications and Processing (pp. 299-306). IEEE.
Wahono, R. S. (2003). Analyzing requirements engineering problems. In IECI Japan Workshop (Vol. 2003).
Sadikin, M. A., & Sunaringtyas, S. U. (2016, August). Implementing digital signature for the secure electronic prescription using QR-code based on android smartphone. In 2016 International Seminar on Application for Technology of Information and Communication (ISemantic) (pp. 306-311). IEEE.
McConnell, S. (2006). Software estimation: demystifying the black art. Microsoft press.
Mariéthoz, J., & Bengio, S. (2002). A comparative study of adaptation methods for speaker verification. In International Conference on Spoken Language Processing ICSLP (No. CONF, pp. 581-584).
Gonzalez-Rodriguez, J., Fierrez-Aguilar, J., Ramos-Castro, D., & Ortega-Garcia, J. (2005). Bayesian analysis of fingerprint, face and signature evidences with automatic biometric systems. Forensic science international, 155(2-3), 126-140.
Sander, T., & Tschudin, C. F. (1998, May). Towards mobile cryptography. In Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186) (pp. 215-224). IEEE.
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2018). Handbook of applied cryptography. CRC press.
Huang, Y. L., Lin, C. H., & Leu, F. Y. (2011, June). Verification of a batch of bad signatures by using the matrix-detection algorithm. In 2011 First International Conference on Data Compression, Communications and Processing (pp. 299-306). IEEE.
Naccache, D., M'RaÏhi, D., Vaudenay, S., & Raphaeli, D. (1995). Can DSA be improved?—Complexity trade-offs with the digital signature standard—. In Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9–12, 1994 Proceedings 13 (pp. 77-85). Springer Berlin Heidelberg.
Bellare, M., Garay, J. A., & Rabin, T. (1998). Fast batch verification for modular exponentiation and digital signatures. In Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31–June 4, 1998 Proceedings 17 (pp. 236-250). Springer Berlin Heidelberg.
Melgar, M. E. V., Farias, M. C., de Barros Vidal, F., & Zaghetto, A. (2016, October). A high density colored 2D-barcode: CQR Code-9. In 2016 29th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI) (pp. 329-334). IEEE.
Dittmann, J., Steinmetz, A., & Steinmetz, R. (1999, June). Content-based digital signature for motion pictures authentication and content-fragile watermarking. In Proceedings IEEE International Conference on Multimedia Computing and Systems (Vol. 2, pp. 209-213). IEEE.
Ahmed, S. T., Singh, D. K., Basha, S. M., Abouel Nasr, E., Kamrani, A. K., & Aboudaif, M. K. (2021). Neural network based mental depression identification and sentiments classification technique from speech signals: A COVID-19 Focused Pandemic Study. Frontiers in public health, 9, 781827.
Lakmal, C., Dangalla, S., Herath, C., Wickramarathna, C., Dias, G., & Fernando, S. (2017, September). IDStack—the common protocol for document verification built on digital signatures. In 2017 National Information Technology Conference (NITC) (pp. 96-99). IEEE.
Harn, L., Ren, J., & Lin, C. (2009). Design of DL-based certificateless digital signatures. Journal of Systems and Software, 82(5), 789-793.
Tsaur, W. J., Tsao, J. H., & Tsao, Y. H. (2018). An efficient and secure ECC-based partially blind signature scheme with multiple banks issuing E-cash payment applications. In Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE) (pp. 94-100). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Ahmed, S. T., Basha, S. M., Ramachandran, M., Daneshmand, M., & Gandomi, A. H. (2023). An Edge-AI enabled Autonomous Connected Ambulance Route Resource Recommendation Protocol (ACA-R3) for eHealth in Smart Cities. IEEE Internet of Things Journal.
Okamoto, T. (2001, May). Provably secure and practical identification schemes and corresponding signature schemes. In Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology Conference Santa Barbara, California, USA August 16–20, 1992 Proceedings (pp. 31-53). Berlin, Heidelberg: Springer Berlin Heidelberg.
Legislativa, A. (2005). Ley de certificados, firmas digitales y documentos electrónicos.
Shao, Z. (2004). Improvement of digital signature with message recovery using self-certified public keys and its variants. Applied mathematics and computation, 159(2), 391-399.
Tseng, Y. M., Jan, J. K., & Chien, H. Y. (2003). Digital signature with message recovery using self-certified public keys and its variants. Applied Mathematics and Computation, 136(2-3), 203-214.
Raja, D. K., Kumar, G. H., Basha, S. M., & Ahmed, S. T. (2022). Recommendations based on integrated matrix time decomposition and clustering optimization. International Journal of Performability Engineering, 18(4), 298.
Mudholkar, S. S., Shende, P. M., & Sarode, M. V. (2012). Biometrics authentication technique for intrusion detection systems using fingerprint recognition. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 2(1), 57-65.
Goldwasser, S., Micali, S., & Rivest, R. L. (1988). A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on computing, 17(2), 281-308.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Naveen Chandra Gowda, Harshith Savanth K, Sagar Shaw, Tharun Deepika M
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
CC Attribution-NonCommercial-NoDerivatives 4.0