Non-conventional digital signatures and their implementations – A review
Entity
UAM. Departamento de Ingeniería InformáticaPublisher
Springer International PublishingDate
2015Citation
10.1007/978-3-319-19713-5_36
International Joint Conference: CISIS’15 and ICEUTE’15. Advances in Intelligent Systems and Computing, Volume 369. Springer, 2015. 425-435
ISSN
2194-5357ISBN
978-3-319-19712-8 (print); 978-3-319-19713-5 (online)DOI
10.1007/978-3-319-19713-5_36Funded by
This work was supported by Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE) and the Spanish Government project TIN2010-19607.Project
Comunidad de Madrid. S2013/ICE-3095/CIBERDINE; Gobierno de España. TIN2010-19607Editor's Version
http://dx.doi.org/10.1007/978-3-319-19713-5_36Subjects
Computational Intelligence; Artificial Intelligence; Higher Education; Data Mining; Knowledge Discovery; InformáticaNote
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-19713-5_36Rights
© Springer-Verlag Berlin Heidelberg 2015Abstract
The current technological scenario determines a profileration
of trust domains, which are usually defined by validating the digital
identity linked to each user. This validation entails critical assumptions
about the way users’ privacy is handled, and this calls for new methods
to construct and treat digital identities. Considering cryptography,
identity management has been constructed and managed through conventional
digital signatures. Nowadays, new types of digital signatures
are required, and this transition should be guided by rigorous evaluation
of the theoretical basis, but also by the selection of properly verified software
means. This latter point is the core of this paper. We analyse the
main non-conventional digital signatures that could endorse an adequate
tradeoff betweeen security and privacy. This discussion is focused on
practical software solutions that are already implemented and available
online. The goal is to help security system designers to discern identity
management functionalities through standard cryptographic software libraries.
Files in this item
Google Scholar:Arroyo, David
-
Diaz, Jesus
-
Rodríguez Ortiz, Francisco Borja
This item appears in the following Collection(s)
Related items
Showing items related by title, author, creator and subject.