A Certified Digital Signature

  • Ralph C. Merkle
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 435)


A practical digital signature system based on a conventional encryption function which is as secure as the conventional encryption function is described. Since certified conventional systems are available it can be implemented quickly, without the several years delay required for certification of an untested system.

Key Words and Phrases

Public Key Cryptosystem Digital Signatures Cryptography Electronic Signatures Receipts Authentication Electronic Funds Transfer 


  1. 1.
    Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. on Inform. IT-22,6(Nov. 1976), 644–654.CrossRefMathSciNetGoogle Scholar
  2. 2.
    Evans A., Kantrowitz, W., and Weiss, E. A user authentication system not requiring secrecy in the computer. Comm. ACM 17,8(Aug. 1974), 437–442.CrossRefGoogle Scholar
  3. 3.
    Kohnfelder, L.M. Using certificates for key distribution in a public-key cryptosystem. Private communication.Google Scholar
  4. 4.
    Lipton, S.M., and Matyas, S.M. Making the digital signature legal-and safeguarded. Data Communications (Feb. 1978), 41–52.Google Scholar
  5. 5.
    McEliece, R.J. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, JPL, (Jan. and Feb. 1978), 42–44.Google Scholar
  6. 6.
    Merkle, R. Secure Communications over Insecure Channels. Comm. ACM 21,4(Apr. 1978), 294–299.CrossRefGoogle Scholar
  7. 7.
    Merkle, R., and Hellman, M. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. on Inform. IT-24,5(Sept. 1978), 525–530.CrossRefGoogle Scholar
  8. 8.
    Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21,2(Feb. 1978), 120–126.zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Wilkes, M.V., Time-Sharing Computer Systems. Elsevier, New York, 1972.Google Scholar
  10. 10.
    Lamport, L., Constructing digital signatures from a one way function. SRI Intl. CSL-98Google Scholar
  11. 11.
    Feistel, H., Cryptography and computer security. Scientific American, 228(May 1973), 15–23.CrossRefGoogle Scholar
  12. 12.
    Shannon, C.E., Communication theory of secrecy systems. Bell Sys. Tech. Jour. 28(Oct. 1949) 656–715.MathSciNetzbMATHGoogle Scholar
  13. 13.
    Rabin, M.O., Digitalized signatures. In Foundations of Secure Computation, R. Lipton and R. DeMillo, Eds., Academic Press, New York, 1978, pp. 155–166.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1990

Authors and Affiliations

  • Ralph C. Merkle
    • 1
  1. 1.Xerox PARCPalo Alto

Personalised recommendations