Title :
A Method for the Signature of Things
Author_Institution :
Coll. of Math. & Inf. Sci., Huanggang Normal Univ., Huanggang, China
Abstract :
The above process can be seen that RSA digital signatures to meet the basic requirements. Known by the RSA cryptosystem, d only one who knows the signer, so the message is not forged the signature, and because call is open, so anyone can use it to verify the authenticity of the signature. But this process there is also a drawback, because the signer´s public key call is open to people who have the key can see the contents of the message, which sometimes is not allowed, because it undermines the confidentiality of the message Requirements. The solution is to send a message sender in the S M and its signature by the recipient´s public key before the M and S for encryption, so that only the receiver can see the true content of the message.
Keywords :
Internet; digital signatures; public key cryptography; RSA cryptosystem; RSA digital signature; encryption; message requirement confidentiality; public key; signature authenticity verification; Communication system security; Digital signatures; Encryption; Internet; Magnetic heads; Internet of Things; RSA; encryption;
Conference_Titel :
Intelligence Science and Information Engineering (ISIE), 2011 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4577-0960-9
Electronic_ISBN :
978-0-7695-4480-9
DOI :
10.1109/ISIE.2011.108