Non-conventional Digital Signatures and Their Implementations—A Review

  • David Arroyo
  • Jesus Diaz
  • Francisco B. Rodriguez
Conference paper

DOI: 10.1007/978-3-319-19713-5_36

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 369)
Cite this paper as:
Arroyo D., Diaz J., Rodriguez F.B. (2015) Non-conventional Digital Signatures and Their Implementations—A Review. In: Herrero Á., Baruque B., Sedano J., Quintián H., Corchado E. (eds) International Joint Conference. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham

Abstract

The current technological scenario determines a profileration of trust domains, which are usually defined by validating the digital identity linked to each user. This validation entails critical assumptions about the way users’ privacy is handled, and this calls for new methods to construct and treat digital identities. Considering cryptography, identity management has been constructed and managed through conventional digital signatures. Nowadays, new types of digital signatures are required, and this transition should be guided by rigorous evaluation of the theoretical basis, but also by the selection of properly verified software means. This latter point is the core of this paper. We analyse the main non-conventional digital signatures that could endorse an adequate tradeoff between security and privacy. This discussion is focused on practical software solutions that are already implemented and available online. The goal is to help security system designers to discern identity management functionalities through standard cryptographic software libraries.

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • David Arroyo
    • 1
  • Jesus Diaz
    • 1
  • Francisco B. Rodriguez
    • 1
  1. 1.Grupo de Neurocomputacion Biologica, Departamento de Ingenieria Informatica, Escuela Politecnica SuperiorUniversidad Autonoma de MadridMadridSpain

Personalised recommendations