Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Digital Signatures

  • Barbara CarminatiEmail author
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_131




In general, given a message M, the digital signature of M generated by a signer S is a bit string univocally bound to M and some secret key known only by S. In practice, since digital signature schemes are based on asymmetric cryptography, the digital signature of M generated by S is a bit string dependent on M and the private key of S. Digital signature schemes have the property that signatures generated with a private key can be validated only by the corresponding public key. This ensures the authenticity of the message. Moreover, any modification on the signed message will invalidate the signature itself. This means that if the signature is validated it provides an evidence that the message has not been altered after the digital signature has been applied on it. This ensures the integrity of the message.

Historical Background

The notion of digital signature appeared in 1976 in a paper by Diffie and Hellman [1], where it has been introduced, for the...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory. 1976;IT-22(6):644–54.CrossRefMathSciNetzbMATHGoogle Scholar
  2. 2.
    Jonsson J, Kaliski B. Public-Key Cryptography Standards (PKCS) No. 1: RSA Cryptography. Request for Comments 3447, Feb 2003.Google Scholar
  3. 3.
    Kravitz DW. Digital signature algorithm. 1993. U.S. Patent No. 5, 231, 668.Google Scholar
  4. 4.
    Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of applied cryptography. CRC; 1996.Google Scholar
  5. 5.
    Ntional Institute of Standards and Technology. Secure Hash Standard. Federal Information Processing Standards Publication, FIPS 180–1, 1995.Google Scholar
  6. 6.
    National Institute of Standards and Technology. Digital Signature Standard (DSS). Federal Information Processing Standards Publication, FIPS 186–2, 2000.Google Scholar
  7. 7.
    Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120–6.CrossRefMathSciNetzbMATHGoogle Scholar
  8. 8.
    World Wide Web Consortium. XML-Signature Syntax and Processing. W3C Recommendation, 2002.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Theoretical and Applied ScienceUniversity of InsubriaVareseItaly

Section editors and affiliations

  • Elena Ferrari
    • 1
  1. 1.DiSTAUniv. of InsubriaVareseItaly