Abstract
The digital signature algorithm (DSA) for securing digital identities was presented. A scheme for securing digital identities under the (DSA) with a software token as well as a hardware token was proposed. The software was advantageous over PKCS#5 in resisting verifiable text attacks with the hardware level security. The scheme was also advantageous over the camouflage scheme because the software was token allowed to be used both for the open and closed public key infrastructure (PKI) and a software token and a hardware token could be issued together and was more efficient.
Original language | English |
---|---|
Pages (from-to) | 247-252 |
Number of pages | 6 |
Journal | Information Processing Letters |
Volume | 82 |
Issue number | 5 |
DOIs | |
Publication status | Published - 2002 Jun 15 |
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Signal Processing
- Information Systems
- Computer Science Applications