111 relations: Adi Shamir, Advanced electronic signature, Adversary (cryptography), Algeria, Algorithm, Authentication, Automotive Network Exchange, Bit array, Bitcoin, Blind signature, Boneh–Lynn–Shacham, California, Certificate authority, Certificate revocation list, Chosen-plaintext attack, Cloud, Collision resistance, Computer security, Contract, Contract management software, Cryptographic engineering, Cryptographic hash function, Cryptographic protocol, Cryptomathic, Data integrity, Detached signature, Digital Signature Algorithm, Digital signature forgery, Digital signature in Estonia, Discrete uniform distribution, EdDSA, EIDAS, Electronic lab notebook, Electronic signature, Electronic signatures and law, Electronic Signatures Directive, ElGamal signature scheme, Elliptic Curve Digital Signature Algorithm, Elliptic-curve cryptography, Email, ESign (India), Euler's totient function, European Union, Evaluation Assurance Level, FIPS 140-2, FIPS 201, Full Domain Hash, GMR (cryptography), GNU Privacy Guard, Healthcare industry, ..., IBM Notes, India, International Cryptology Conference, Interoperability, Key escrow, Key generation, Key size, Keystroke logging, Lamport signature, Leonard Adleman, Leslie Lamport, Malleability (cryptography), Martin Hellman, Massachusetts, Massachusetts Institute of Technology, Merkle tree, Mexico, Michael O. Rabin, Mihir Bellare, Modular arithmetic, Moni Naor, Moti Yung, Multi-factor authentication, National Institute of Standards and Technology, Negligible function, Non-repudiation, Numeric keypad, Online Certificate Status Protocol, Oracle machine, Pairing, Permutation, Personal identification number, Peter Landrock, Pointcheval–Stern signature algorithm, Probabilistic signature scheme, Public key certificate, Public key infrastructure, Public-key cryptography, Rabin signature algorithm, Ron Rivest, Ross J. Anderson, RSA (cryptosystem), SAFE-BioPharma Association, Schnorr signature, Secure multi-party computation, Server-based signatures, Shafi Goldwasser, Signatures with efficient protocols, Silvio Micali, Smart card, Switzerland, Title 21 CFR Part 11, Trapdoor function, Turkey, Unary numeral system, Undeniable signature, University of Chicago, Uruguay, Utah, Whitfield Diffie, Zero-knowledge proof. Expand index (61 more) » « Shrink index
Adi Shamir (עדי שמיר; born July 6, 1952) is an Israeli cryptographer.
New!!: Digital signature and Adi Shamir · See more »
Advanced electronic signature
An advanced electronic signature (AdES) is an electronic signature that has met the requirements set forth under EU Regulation No 910/2014 (eIDAS-regulation) on electronic identification and trust services for electronic transactions in the internal market.
New!!: Digital signature and Advanced electronic signature · See more »
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving their goal (primarily privacy, integrity, and availability of data).
New!!: Digital signature and Adversary (cryptography) · See more »
Algeria (الجزائر, familary Algerian Arabic الدزاير; ⴷⵣⴰⵢⴻⵔ; Dzayer; Algérie), officially the People's Democratic Republic of Algeria, is a sovereign state in North Africa on the Mediterranean coast.
New!!: Digital signature and Algeria · See more »
In mathematics and computer science, an algorithm is an unambiguous specification of how to solve a class of problems.
New!!: Digital signature and Algorithm · See more »
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
New!!: Digital signature and Authentication · See more »
Automotive Network Exchange
ANXeBusiness Corp. (ANX) is the company that owns and operates the Automotive Network Exchange (ANX), a large private extranet that connects automotive suppliers to automotive manufacturers.
New!!: Digital signature and Automotive Network Exchange · See more »
A bit array (also known as bit map, bit set, bit string, or bit vector) is an array data structure that compactly stores bits.
New!!: Digital signature and Bit array · See more »
Bitcoin (₿) is the world's first cryptocurrency, a form of electronic cash.
New!!: Digital signature and Bitcoin · See more »
In cryptography a blind signature, as introduced by David Chaum, is a form of digital signature in which the content of a message is disguised (blinded) before it is signed.
New!!: Digital signature and Blind signature · See more »
In cryptography, the Boneh–Lynn–Shacham (BLS) signature scheme allows a user to verify that a signer is authentic.
New!!: Digital signature and Boneh–Lynn–Shacham · See more »
California is a state in the Pacific Region of the United States.
New!!: Digital signature and California · See more »
In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates.
New!!: Digital signature and Certificate authority · See more »
Certificate revocation list
A certificate revocation list (or CRL) is "a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should no longer be trusted.".
New!!: Digital signature and Certificate revocation list · See more »
A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts.
New!!: Digital signature and Chosen-plaintext attack · See more »
In meteorology, a cloud is an aerosol consisting of a visible mass of minute liquid droplets, frozen crystals, or other particles suspended in the atmosphere of a planetary body.
New!!: Digital signature and Cloud · See more »
Collision resistance is a property of cryptographic hash functions: a hash function H is collision resistant if it is hard to find two inputs that hash to the same output; that is, two inputs a and b such that H(a).
New!!: Digital signature and Collision resistance · See more »
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
New!!: Digital signature and Computer security · See more »
A contract is a promise or set of promises that are legally enforceable and, if violated, allow the injured party access to legal remedies.
New!!: Digital signature and Contract · See more »
Contract management software
Contract management software is the range of computer programmes, libraries and data used to support contract management, contract lifecycle management, and contractor management on projects.
New!!: Digital signature and Contract management software · See more »
Cryptographic Engineering is the discipline of using cryptography to solve human problems.
New!!: Digital signature and Cryptographic engineering · See more »
Cryptographic hash function
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.
New!!: Digital signature and Cryptographic hash function · See more »
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives.
New!!: Digital signature and Cryptographic protocol · See more »
Cryptomathic is a software company specializing in the area of cryptography for e-commerce security systems.
New!!: Digital signature and Cryptomathic · See more »
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.
New!!: Digital signature and Data integrity · See more »
A detached signature is a type of digital signature that is kept separate from its signed data, as opposed to bundled together into a single file.
New!!: Digital signature and Detached signature · See more »
Digital Signature Algorithm
The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures.
New!!: Digital signature and Digital Signature Algorithm · See more »
Digital signature forgery
In a cryptographic digital signature or MAC system, digital signature forgery is the ability to create a pair consisting of a message, m, and a signature (or MAC), \sigma, that is valid for m, where m has not been signed in the past by the legitimate signer.
New!!: Digital signature and Digital signature forgery · See more »
Digital signature in Estonia
Electronic signature allows users to electronically perform the actions for which they previously had to give a signature on paper.
New!!: Digital signature and Digital signature in Estonia · See more »
Discrete uniform distribution
In probability theory and statistics, the discrete uniform distribution is a symmetric probability distribution whereby a finite number of values are equally likely to be observed; every one of n values has equal probability 1/n.
New!!: Digital signature and Discrete uniform distribution · See more »
In public-key cryptography, Edwards-curve Digital Signature Algorithm (EdDSA) is a digital signature scheme using a variant of Schnorr signature based on Twisted Edwards curves.
New!!: Digital signature and EdDSA · See more »
eIDAS (electronic IDentification, Authentication and trust Services) is an EU regulation on / a set of standards for electronic identification and trust services for electronic transactions in the European Single Market.
New!!: Digital signature and EIDAS · See more »
Electronic lab notebook
An electronic lab notebook (also known as electronic laboratory notebook, or ELN) is a computer program designed to replace paper laboratory notebooks.
New!!: Digital signature and Electronic lab notebook · See more »
An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign.
New!!: Digital signature and Electronic signature · See more »
Electronic signatures and law
Worldwide, legislation concerning the effect and validity of electronic signatures, including, but not limited to, cryptographic digital signatures, includes.
New!!: Digital signature and Electronic signatures and law · See more »
Electronic Signatures Directive
The Electronic Signatures Directive was a European Union Directive on the use of electronic signatures (e-signatures) in electronic contracts within the European Union (EU).
New!!: Digital signature and Electronic Signatures Directive · See more »
ElGamal signature scheme
The ElGamal signature scheme is a digital signature scheme which is based on the difficulty of computing discrete logarithms.
New!!: Digital signature and ElGamal signature scheme · See more »
Elliptic Curve Digital Signature Algorithm
In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic curve cryptography.
New!!: Digital signature and Elliptic Curve Digital Signature Algorithm · See more »
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
New!!: Digital signature and Elliptic-curve cryptography · See more »
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.
New!!: Digital signature and Email · See more »
Aadhaar eSign is an online electronic signature service in India to facilitate an Aadhaar holder to digitally sign a document.
New!!: Digital signature and ESign (India) · See more »
Euler's totient function
In number theory, Euler's totient function counts the positive integers up to a given integer that are relatively prime to.
New!!: Digital signature and Euler's totient function · See more »
The European Union (EU) is a political and economic union of EUnum member states that are located primarily in Europe.
New!!: Digital signature and European Union · See more »
Evaluation Assurance Level
The Evaluation Assurance Level (EAL1 through EAL7) of an IT product or system is a numerical grade assigned following the completion of a Common Criteria security evaluation, an international standard in effect since 1999.
New!!: Digital signature and Evaluation Assurance Level · See more »
The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules.
New!!: Digital signature and FIPS 140-2 · See more »
FIPS 201 (Federal Information Processing Standard Publication 201) is a United States federal government standard that specifies Personal Identity Verification (PIV) requirements for Federal employees and contractors.
New!!: Digital signature and FIPS 201 · See more »
Full Domain Hash
In cryptography, the Full Domain Hash (FDH) is an RSA-based signature scheme that follows the hash-and-sign paradigm.
New!!: Digital signature and Full Domain Hash · See more »
In cryptography, GMR is a digital signature algorithm named after its inventors Shafi Goldwasser, Silvio Micali and Ron Rivest.
New!!: Digital signature and GMR (cryptography) · See more »
GNU Privacy Guard
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite.
New!!: Digital signature and GNU Privacy Guard · See more »
The healthcare industry (also called the medical industry or health economy) is the range of companies and non-profit organizations that provide medical services, manufacture medical equipment, and develop pharmaceuticals.
New!!: Digital signature and Healthcare industry · See more »
IBM Notes (formerly Lotus Notes; see branding, below) and IBM Domino (formerly Lotus Domino) are the client and server, respectively, of a collaborative client-server software platform sold by IBM.
New!!: Digital signature and IBM Notes · See more »
India (IAST), also called the Republic of India (IAST), is a country in South Asia.
New!!: Digital signature and India · See more »
International Cryptology Conference
CRYPTO, the International Cryptology Conference, is one of the largest academic conferences in cryptography and cryptanalysis.
New!!: Digital signature and International Cryptology Conference · See more »
Interoperability is a characteristic of a product or system, whose interfaces are completely understood, to work with other products or systems, at present or in the future, in either implementation or access, without any restrictions.
New!!: Digital signature and Interoperability · See more »
Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys.
New!!: Digital signature and Key escrow · See more »
Key generation is the process of generating keys in cryptography.
New!!: Digital signature and Key generation · See more »
In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).
New!!: Digital signature and Key size · See more »
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
New!!: Digital signature and Keystroke logging · See more »
In cryptography, a Lamport signature or Lamport one-time signature scheme is a method for constructing a digital signature.
New!!: Digital signature and Lamport signature · See more »
Leonard Adleman (born December 31, 1945) is an American computer scientist.
New!!: Digital signature and Leonard Adleman · See more »
Leslie B. Lamport (born February 7, 1941) is an American computer scientist.
New!!: Digital signature and Leslie Lamport · See more »
Malleability is a property of some cryptographic algorithms.
New!!: Digital signature and Malleability (cryptography) · See more »
Martin Edward Hellman (born October 2, 1945) is an American cryptologist, best known for his invention of public key cryptography in cooperation with Whitfield Diffie and Ralph Merkle.
New!!: Digital signature and Martin Hellman · See more »
Massachusetts, officially known as the Commonwealth of Massachusetts, is the most populous state in the New England region of the northeastern United States.
New!!: Digital signature and Massachusetts · See more »
Massachusetts Institute of Technology
The Massachusetts Institute of Technology (MIT) is a private research university located in Cambridge, Massachusetts, United States.
New!!: Digital signature and Massachusetts Institute of Technology · See more »
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the hash of a data block and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes.
New!!: Digital signature and Merkle tree · See more »
Mexico (México; Mēxihco), officially called the United Mexican States (Estados Unidos Mexicanos) is a federal republic in the southern portion of North America.
New!!: Digital signature and Mexico · See more »
Michael O. Rabin
Michael Oser Rabin (מִיכָאֵל עוזר רַבִּין, born September 1, 1931) is an Israeli computer scientist and a recipient of the Turing Award.
New!!: Digital signature and Michael O. Rabin · See more »
Mihir Bellare is a cryptographer and professor at the University of California San Diego.
New!!: Digital signature and Mihir Bellare · See more »
In mathematics, modular arithmetic is a system of arithmetic for integers, where numbers "wrap around" upon reaching a certain value—the modulus (plural moduli).
New!!: Digital signature and Modular arithmetic · See more »
Moni Naor (מוני נאור) is an Israeli computer scientist, currently a professor at the Weizmann Institute of Science.
New!!: Digital signature and Moni Naor · See more »
Mordechai M. (Moti) Yung is an Israeli-American cryptographer and computer scientist with an extensive industrial research career.
New!!: Digital signature and Moti Yung · See more »
Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).
New!!: Digital signature and Multi-factor authentication · See more »
National Institute of Standards and Technology
The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.
New!!: Digital signature and National Institute of Standards and Technology · See more »
In mathematics, a negligible function is a function \mu:\mathbb\to\mathbb such that for every positive integer c there exists an integer Nc such that for all x > Nc, Equivalently, we may also use the following definition.
New!!: Digital signature and Negligible function · See more »
Non-repudiation refers to a state of affairs where the author of a statement will not be able to successfully challenge the authorship of the statement or validity of an associated contract.
New!!: Digital signature and Non-repudiation · See more »
A numeric keypad, number pad, numpad, or ten key, is the palm-sized, 17-key section of a standard computer keyboard, usually on the far right.
New!!: Digital signature and Numeric keypad · See more »
Online Certificate Status Protocol
The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate.
New!!: Digital signature and Online Certificate Status Protocol · See more »
In complexity theory and computability theory, an oracle machine is an abstract machine used to study decision problems.
New!!: Digital signature and Oracle machine · See more »
In mathematics, a pairing is an R-bilinear map of modules, where R is the underlying ring.
New!!: Digital signature and Pairing · See more »
In mathematics, the notion of permutation relates to the act of arranging all the members of a set into some sequence or order, or if the set is already ordered, rearranging (reordering) its elements, a process called permuting.
New!!: Digital signature and Permutation · See more »
Personal identification number
A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.
New!!: Digital signature and Personal identification number · See more »
Peter Landrock (born August 20, 1948 in Horsens) is a Danish cryptographer and mathematician.
New!!: Digital signature and Peter Landrock · See more »
Pointcheval–Stern signature algorithm
In cryptography, the Pointcheval–Stern signature algorithm is a digital signature scheme based on the closely related ElGamal signature scheme.
New!!: Digital signature and Pointcheval–Stern signature algorithm · See more »
Probabilistic signature scheme
Probabilistic Signature Scheme (PSS) is a cryptographic signature scheme designed by Mihir Bellare and Phillip Rogaway.
New!!: Digital signature and Probabilistic signature scheme · See more »
Public key certificate
In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key.
New!!: Digital signature and Public key certificate · See more »
Public key infrastructure
A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
New!!: Digital signature and Public key infrastructure · See more »
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
New!!: Digital signature and Public-key cryptography · See more »
Rabin signature algorithm
In cryptography the Rabin signature algorithm is a method of digital signature originally proposed by Michael O. Rabin in 1979.
New!!: Digital signature and Rabin signature algorithm · See more »
Ronald Linn Rivest (born May 6, 1947) is a cryptographer and an Institute Professor at MIT.
New!!: Digital signature and Ron Rivest · See more »
Ross J. Anderson
Ross John Anderson, FRS, FREng (born 15 September 1956) is a researcher, writer, and industry consultant in security engineering.
New!!: Digital signature and Ross J. Anderson · See more »
RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.
New!!: Digital signature and RSA (cryptosystem) · See more »
SAFE-BioPharma Association is the non-profit association that created and manages the SAFE-BioPharma digital identity and digital signature standard for the global pharmaceutical, biotech and healthcare industries.
New!!: Digital signature and SAFE-BioPharma Association · See more »
In cryptography, a Schnorr signature is a digital signature produced by the Schnorr signature algorithm.
New!!: Digital signature and Schnorr signature · See more »
Secure multi-party computation
Secure multi-party computation (also known as secure computation, multi-party computation/MPC, or privacy-preserving computation) is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private.
New!!: Digital signature and Secure multi-party computation · See more »
In cryptography, server-based signatures are digital signatures in which a publicly available server participates in the signature creation process.
New!!: Digital signature and Server-based signatures · See more »
Shafrira Goldwasser (שפרירה גולדווסר; born 1959) is an American-Israeli computer scientist and winner of the Turing Award in 2012.
New!!: Digital signature and Shafi Goldwasser · See more »
Signatures with efficient protocols
Signatures with efficient protocols are a form of digital signature invented by Jan Camenisch and Anna Lysyanskaya in 2001.
New!!: Digital signature and Signatures with efficient protocols · See more »
Silvio Micali (born October 13, 1954) is an Italian computer scientist at MIT Computer Science and Artificial Intelligence Laboratory and a professor of computer science in MIT's Department of Electrical Engineering and Computer Science since 1983.
New!!: Digital signature and Silvio Micali · See more »
A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.
New!!: Digital signature and Smart card · See more »
Switzerland, officially the Swiss Confederation, is a sovereign state in Europe.
New!!: Digital signature and Switzerland · See more »
Title 21 CFR Part 11
Title 21 CFR Part 11 is the part of Title 21 of the Code of Federal Regulations that establishes the United States Food and Drug Administration (FDA) regulations on electronic records and electronic signatures (ERES).
New!!: Digital signature and Title 21 CFR Part 11 · See more »
A trapdoor function is a function that is easy to compute in one direction, yet difficult to compute in the opposite direction (finding its inverse) without special information, called the "trapdoor".
New!!: Digital signature and Trapdoor function · See more »
Turkey (Türkiye), officially the Republic of Turkey (Türkiye Cumhuriyeti), is a transcontinental country in Eurasia, mainly in Anatolia in Western Asia, with a smaller portion on the Balkan peninsula in Southeast Europe.
New!!: Digital signature and Turkey · See more »
Unary numeral system
The unary numeral system is the bijective base-1 numeral system.
New!!: Digital signature and Unary numeral system · See more »
An undeniable signature is a digital signature scheme which allows the signer to be selective to whom they allow to verify signatures.
New!!: Digital signature and Undeniable signature · See more »
University of Chicago
The University of Chicago (UChicago, U of C, or Chicago) is a private, non-profit research university in Chicago, Illinois.
New!!: Digital signature and University of Chicago · See more »
Uruguay, officially the Oriental Republic of Uruguay (República Oriental del Uruguay), is a sovereign state in the southeastern region of South America.
New!!: Digital signature and Uruguay · See more »
Utah is a state in the western United States.
New!!: Digital signature and Utah · See more »
Bailey Whitfield 'Whit' Diffie (born June 5, 1944) is an American cryptographer and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle.
New!!: Digital signature and Whitfield Diffie · See more »
In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover Peggy) can prove to another party (the verifier Victor) that she knows a value x, without conveying any information apart from the fact that she knows the value x. Another way of understanding this would be: Interactive zero-knowledge proofs require interaction between the individual (or computer system) proving their knowledge and the individual validating the proof.
New!!: Digital signature and Zero-knowledge proof · See more »
.sign, Adaptive chosen message attack, Adaptive chosen-message attack, Cryptographic signature, Digital Signature, Digital key, Digital keys, Digital signature scheme, Digital signatures, Digital signing, Digital signiture, Digitally Signed, Digitally signed, E-imza, Signature (computers), Signature (computing), Signature (cryptography), Signature files, Signature scheme, Signed code, 🔏.