The Design of Digital Signature System Based on PKI


Article Preview

The importance of information security in e-commerce is expatiated. In response to these problems, a digital signature approach based on the PKI is presented with digital signature technology. An approach for digital signature based on PKI is designed and realized. This approach is very convenient and simple, moreover, it is visual, and the operator needn’t have any special knowledge of digital signature.



Edited by:

Qi Luo






C. Wang et al., "The Design of Digital Signature System Based on PKI", Applied Mechanics and Materials, Vols. 20-23, pp. 1323-1327, 2010

Online since:

January 2010




[1] Anderson, K., IT Security Professionals Must Evolve for Changing Market, SC Magazine, October 12, (2006).

[2] Aceituno, V., On Information Security Paradigms, ISSA Journal, September, (2005).

[3] Dhillon, G., Principles of Information Systems Security: text and cases, John Wiley & Sons, (2007).

[4] Lambo, T. ISO/IEC 27001: The future of infosec certification, ISSA Journal, November, (2006).

[5] Zhongxiao Hao, Xilong Qu The Design and realization of Digital Signature Based on Digital PKI, Proceeding of IASP2009, pp.115-118, April (2009).

[6] Damgård, Ivan; Mikkelsen, Gert Laessoe, On the theory and practice of personal digital signatures, v 5443, Lecture �otes in Computer Science, 2009, pp.277-296.

DOI: 10.1007/978-3-642-00468-1_16

[7] Levi, Albert; Güder, Can Berk, Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach, vol. 28, no. 3, Computers and Security, June 2009, pp.105-120.

DOI: 10.1016/j.cose.2008.09.003

[8] Sunitha, N.R.; Amberker, B.B. A new method of verifying digital signatures in e-cheque processing, Proceedings of the 2008 16th International Conference on �etworks, ICON 2008, (2008).

DOI: 10.1109/icon.2008.4772604

[9] Poulos, Marios; Bokos, George; Vaioulis, Fotios, Towards the semantic extraction of digital signatures for librarian image-identification purposes, Journal of the American Society for Information Science and Technology, v 59, n 5, pp.708-718, March (2008).

DOI: 10.1002/asi.20753

[10] Wen, Xiaojun, Secure authentic digital signature scheme using quantum fingerprinting,. Chinese Journal of Electronics, v 17, n 2, pp.340-344, April (2008).

In order to see related information, you need to Login.