Skip to main content

A Certified Digital Signature

Part of the Lecture Notes in Computer Science book series (LNCS,volume 435)

Abstract

A practical digital signature system based on a conventional encryption function which is as secure as the conventional encryption function is described. Since certified conventional systems are available it can be implemented quickly, without the several years delay required for certification of an untested system.

Key Words and Phrases

  • Public Key Cryptosystem
  • Digital Signatures
  • Cryptography
  • Electronic Signatures
  • Receipts
  • Authentication
  • Electronic Funds Transfer

(Subtitle: That Antique Paper from 1979)

This work was partially supported under contracts F49620-78-C-0086 from the U.S. Air Force Office of Scientific Research and DAAG29-78-C-0036 from the U.S. Army Research Office. Much of this work was done when the author was at Stanford University in the Electrical Engineering Department, and some was done when the author was at BNR in Palo Alto.

Bibliography

  1. Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. on Inform. IT-22,6(Nov. 1976), 644–654.

    CrossRef  MathSciNet  Google Scholar 

  2. Evans A., Kantrowitz, W., and Weiss, E. A user authentication system not requiring secrecy in the computer. Comm. ACM 17,8(Aug. 1974), 437–442.

    CrossRef  Google Scholar 

  3. Kohnfelder, L.M. Using certificates for key distribution in a public-key cryptosystem. Private communication.

    Google Scholar 

  4. Lipton, S.M., and Matyas, S.M. Making the digital signature legal-and safeguarded. Data Communications (Feb. 1978), 41–52.

    Google Scholar 

  5. McEliece, R.J. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, JPL, (Jan. and Feb. 1978), 42–44.

    Google Scholar 

  6. Merkle, R. Secure Communications over Insecure Channels. Comm. ACM 21,4(Apr. 1978), 294–299.

    CrossRef  Google Scholar 

  7. Merkle, R., and Hellman, M. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. on Inform. IT-24,5(Sept. 1978), 525–530.

    CrossRef  Google Scholar 

  8. Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21,2(Feb. 1978), 120–126.

    MATH  CrossRef  MathSciNet  Google Scholar 

  9. Wilkes, M.V., Time-Sharing Computer Systems. Elsevier, New York, 1972.

    Google Scholar 

  10. Lamport, L., Constructing digital signatures from a one way function. SRI Intl. CSL-98

    Google Scholar 

  11. Feistel, H., Cryptography and computer security. Scientific American, 228(May 1973), 15–23.

    CrossRef  Google Scholar 

  12. Shannon, C.E., Communication theory of secrecy systems. Bell Sys. Tech. Jour. 28(Oct. 1949) 656–715.

    MathSciNet  MATH  Google Scholar 

  13. Rabin, M.O., Digitalized signatures. In Foundations of Secure Computation, R. Lipton and R. DeMillo, Eds., Academic Press, New York, 1978, pp. 155–166.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 1990 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Merkle, R.C. (1990). A Certified Digital Signature. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_21

Download citation

  • DOI: https://doi.org/10.1007/0-387-34805-0_21

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-97317-3

  • Online ISBN: 978-0-387-34805-6

  • eBook Packages: Springer Book Archive