Design and Realization of Digital Signature System

Article Preview

Abstract:

The crux of safety communication of computer network lies in the accuracy of data transmission and the security of confidential data. Information security is the premise and foundation of all communication based on computer network. Business online becomes much more risky. Security technologies, such as authentication, encryption, must be implemented to ensure the security of the transactions. Digital signature technology plays an irreplaceable role in the fields of identification and authentication, data integrity, anti-repudiation and so on, which has a very wide range of application in e-commerce and e-government. The radical methods and traits of digital signature are introduced. The approach of digital signature based on Java is presented, and its rationality, effectively and feasibility are reasoned, the test results achieved the expected goals and ensured the confidentiality, integrity, and non-repudiation of the information. This solution can be widely used in digital campus, enterprise nets, etc, and has a good application prospect.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 562-564)

Pages:

872-875

Citation:

Online since:

August 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] TAI Suiyan , LUO Ping, PENG Xiaoning, WANG Daoshun, Weak-keys in Public Key Cryptosystems Based on Discrete Logarithms, TSINGHUA SCIENCE AND TECHNOLOGY, Volume10, Number 5, p.579–581, October (2005).

DOI: 10.1016/s1007-0214(05)70121-8

Google Scholar

[2] FAN Haining, LIU Duo, DAI Yiqi, Two Normal Basis Multiplication Algorrithms for GF(2n), TSINGHUA SCIENCE AND TECHNOLOGY, Volune 11, Number 3, p.264–270, Jane (2006).

DOI: 10.1016/s1007-0214(06)70189-4

Google Scholar

[3] YU Yong, YANG Bo, YANG Guoqing, AN Identity-Based Scheme of Fair Exchange of Digital Signatures, Wuhan University Journal of Natureal Sciences, Vol. 11 No. 6, p.1761–1764, (2006).

DOI: 10.1007/bf02831869

Google Scholar

[4] JIANG Han, XU Qiuliang, LIN Fengbo, Forword-Secure Digital Signature Scheme with Tamper Evidence, Wuhan University Journal of Natureal Sciences, Vol. 13 No. 5, p.582–586, (2008).

DOI: 10.1007/s11859-008-0514-5

Google Scholar

[5] GU Bao-jun, ZHOU Yi, WANG Wei-nong, Batch RSA Signature Scheme, J. Shanghai Jiaotong Univ. (Sci. ), p.290–292 2009, 14(3).

DOI: 10.1007/s12204-009-0290-1

Google Scholar

[6] JIANG Wei-qiang, YANG Yi-xian, HUANG Zheng-quan, Reserch on Certification Authority Based on J2EE Architecture, Journal of wuhan University of Technology, p.105–109, 2008, 30(2).

Google Scholar

[7] YANG Wenze, LI Cuihua, Implementation of Digital Signature in Automatic Office System, Computer Engineering , pp.33-35 , 2005, 31(23).

Google Scholar

[8] ZHU Shenglin, The Application of XML Signature in the Grade Management of Colleges or Universities, Computer Engineering and Applications, pp.227-229, 2005. 26.

Google Scholar

[9] SHI Linxiang, HE Haihui, WEI Shutao,An Utilitarian Method in Implementing File Encryption, Computer Engineering, pp.332-336, Vol. 30.

Google Scholar

[10] DAI Jiapeng, LIU Naiqi, The Design and Implementation of a Secure Digital Signature System, Computer Engineering and Application, pp.152-153, 2007. 25.

Google Scholar

[11] YIN Zhao-lin, ZHANG Yong-ping, JIANG Shu-jvan, JAVA Advanced Programming Network, Bei Jing, Tsinghua university press, pp.327-356, (2005).

Google Scholar