After that authentication is carried out for signature using Digital Signature Scheme (DSS) Algorithm.
In this framework, two algorithms were used, Digital Signature Scheme (DSS) and Key Policy Attribute Based Encryption (KP-ABE) .
Improving the exacting security of digital signature schemes
, Journal of Cryptology, 15(1), pp.
In the strong insider security model, the privacy of the signcryption scheme is based on the security of the public-key encryption scheme and the integrity protection of the signcryption scheme is based on the security of the digital signature scheme
7] proposed an authenticated encryption (AE) scheme to realize the concept of providing digital signature schemes
with the confidentiality.
2000) A new forward secure digital signature scheme.
1988) A digital signature scheme secure against adaptive chosen-message attacks.
In Section 2, we review Chang et al's digital signature scheme
and authentication encryption scheme.
Typical digital signature schemes
are constructed by combining a cryptographic hash function and a public key scheme.
In order to guarantee the security of the network data, owing to the flexible structure and implementation simplicity of lattice cryptography, two efficient digital signature schemes
from R-LWE assumption are proposed, and the analyses show that they are unforgeable in the chosen message attack model.
FireWall-1 currently offers support of leading encryption technologies including Diffie-Hellman for key management, RSA for digital signature schemes
, as well as DES, the recognized standard encryption technology and Check Point's proprietary, exportable encryption algorithm, FWZ1.