
A research on different digital signature schemes
- 1 Fuzhou University
* Author to whom correspondence should be addressed.
Abstract
In the past years, digital signature development has rapidly with new products combined with blockchain, named distribute networks, and quantum computers, while there plays a vitally important role in file authorization and verification. In combination with various new technologies, digital signatures present a vigorous vitality, and new algorithms are widely used in varieties of scenarios including banking, financial services, and insurance (BFSI), education, E-government, healthcare, and the military. In this case, there is no paper illustrating a summary of those new digital signature applications, which is the aim of this paper working on. This paper indicates the technology details of digital signatures and blockchain. And the paper discusses which digital signature algorithms are used in different fields to give an overview of the relationship between algorithms and scenarios. Furthermore, the paper demonstrates the comparison in the most commonly used digital signature algorithm containing Rivest–Shamir–Adleman (RSA) algorithms, Lamport algorithms, Elliptic Curve Digital Signature Algorithm (ECDSA), and Edwards-curve Digital Signature Algorithm (EdDSA) algorithms on their difference in performance.
Keywords
digital signature, application, algorithm performance
[1]. Roy A and Karforma S 2012 J Journal of Computer and Information Technology A Survey on digital signatures and its applications vol 3 pp 45-69
[2]. Zhou X and Tang X 2011 C Proceedings of 2011 6th international forum on strategic technology IEEE Research and implementation of RSA algorithm for encryption and decryption vol 2 pp 1118-1121
[3]. Hankerson D, Menezes A J and Vanstone S 2006 Springer Science & Business Media Guide to elliptic curve cryptography
[4]. Islam M M, Hossain M S, Hasan M K and et al 2020 Sensors Design and implementation of high-performance ECC processor with unified point addition on twisted edwards curve vol 20 p 5148
[5]. Feng T, Yang R and Gong R 2021 International Journal of Network Security Digital Copyright Protection System for Oil and Gas Knowledge Achievements Based on Blockchain vol 23 pp 631-641
[6]. Kaur J 2020 J New Paradigm in Business & Education BLOCK CHAIN: FROM BLOCK TO CHAINS p 60.
[7]. Nofer M, Gomber P, Hinz O and et al 2017 Business & Information Systems Engineering Blockchain vol 59 pp 183-187
[8]. Mordor Intelligence 2021 Digital Signature Market Share, Growth | Research Report p 2029
[9]. Sun H, Mao H, Bai X and et al 2017 18th International conference on parallel and distributed computing, applications and technologies (PDCAT), IEEE Multi-blockchain model for central bank digital currency pp 360-367
[10]. Pancholi V R, Bhadresh P and Hiran D 2018 A study on importance of digital signature for e-governance schemes vol 4 pp 7-10
[11]. Mehbodniya A, Webber J L, Neware R and et al 2022 Expert Systems Modified Lamport Merkle Digital Signature blockchain framework for authentication of internet of things healthcare data vol 39 p 12978
[12]. Guruprakash J and Koppu S 2022 Informatica An Empirical Study to Demonstrate that EdDSA can be used as a Performance Improvement Alternative to ECDSA in Blockchain and IoT p 46
[13]. Rahardja U, Sudaryono S, Santoso N P L and et al 2020 International Journal of Artificial Intelligence Research Covid-19: Digital Signature Impact on Higher Education Motivation Performance vol 4 pp 65-74
[14]. CorrineTan 2019 CorrineTan/Digital-Signature-Schemes-Evaluation: Analysing 3 digital signature algorithms – RSA, ECC and Lamport signature – to evaluate and compare them.
[15]. Kirsch Z, Chow M 2015 Quantum computing The risk to existing encryption methods
Cite this article
Fang,Y. (2023). A research on different digital signature schemes. Applied and Computational Engineering,16,27-35.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 5th International Conference on Computing and Data Science
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).