Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Digital Signature

Handbook of Research on Public Information Technology
An encrypted message digest created with a private key to authenticate the sender of a computer file or a message.
Published in Chapter:
Federal Public-Key Infrastructure
Ludwig Slusky (California State University–Los Angeles, USA) and Parviz Partow-Navid (California State University–Los Angeles, USA)
Copyright: © 2008 |Pages: 12
DOI: 10.4018/978-1-59904-857-4.ch040
Abstract
All branches of federal government are required to change their business practices to a paperless operation. Privacy and information security are critical for the protection of information shared over networks internally between the U.S. government agencies and externally with nonfederal organizations (businesses; state, local, and foreign governments; academia; etc.) or individuals. The public-key infrastructure (PKI) is the simplest, most widely used architecture for secure data exchange over unsecured networks. It integrates computer hardware and software, cryptography, information and network security, and policies and procedures to facilitate trust in distributed electronic transactions and mitigate the associated risks. Federal PKI (FPKI) is PKI designed for implementation and use by government agencies. Federal PKI research was under way since 1991, and by the end of 2005, the federal PKI included 13 cross-certified federal entities, three approved shared service providers (SSPs; Verisign, Cyber- Trust, National Finance Center/U.S. Department of Agriculture [USDA]), one state, and three foreign countries (Canada, UK, and Australia; Alterman, 2005). Initially envisioned as an interoperability mechanism for federal organizations exclusively, the federal PKI is now positioned for trust interoperability and cross-certification internally among federal agencies and externally with other organizations.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Future Challenges of Marketing Online-to-Offline (O2O)
Is a method of authenticating digital information typically treated as a substitute for a physical signature, as it eliminates the need to have a paper version of the document that needs to be signed.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Payment
An electronic signature based upon cryptographic methods of origin authentication. Usually it is appended to a message to assure the recipient of the authenticity and integrity of the message.
Full Text Chapter Download: US $37.50 Add to Cart
Building Secure and Dependable Online Gaming Applications
A digital signature aims to serve the same purposes as a real-world signature. A sound digital signature ensures that the sender of the digital signature can be authenticated, the sender cannot later repudiate that she of he has sent the signed message, and a receiver cannot forge a digital signature (without being detected).
Full Text Chapter Download: US $37.50 Add to Cart
An Overview of Privilege Management Infrastructure (PMI)
An electronic signature can be deemed the digital equivalent of a handwritten signature. Electronic signatures can be used to authenticate the identity of the signer of the document and to also confirm the data integrity of the document.
Full Text Chapter Download: US $37.50 Add to Cart
Performance and Accountability in E-Budgeting Projects
A digital signature is any procedure of encryption for the purpose of information or transactional safety, which is intended to be equivalent to a hand-written signature.
Full Text Chapter Download: US $37.50 Add to Cart
Use of Bitcoin for Internet Trade
A mathematical scheme for ensuring the authenticity of a message. The sender encrypts the message using its private key in order to create a digital signature. By doing this, the sender adds his identity to the message since the private key is only owned by that particular sender.
Full Text Chapter Download: US $37.50 Add to Cart
Virtual Private Networks
An identifier used to authenticate the sender of an electronic message or the signer of an electronic document.
Full Text Chapter Download: US $37.50 Add to Cart
Data Confidentiality, Integrity, and Authentication
It is a mathematical scheme for presenting the authenticity of digital messages or documents; it uses public and private keys to encrypt and decrypt the data.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Video Authentication
Cryptographic means to determine the integrity of a digital content.
Full Text Chapter Download: US $37.50 Add to Cart
Cryptography for Information Security
Also called electronic signature, it is used to indicate that the plain text or file that it is attached to an electronic mail is originated by the sender. The process has three parts: Key Generation, Signature, and Verification. There are other terms comes in association with Digital Signature, such as Digital Certificates (DC).
Full Text Chapter Download: US $37.50 Add to Cart
Bitcoin for E-Commerce: Principles and Applications
A digital string calculated from a digital document and a cryptographic private key. A digital signature is bound to both the document signed (hence document-dependent) and the signing key and is universally verifiable.
Full Text Chapter Download: US $37.50 Add to Cart
Trustworthy Networks, Authentication, Privacy, and Security Models
Digital signature is a type of asymmetric cryptography used to simulate the security properties of a signature in digital rather than written form. Digital signature schemes normally give two algorithms, one for signing which involves the user’s secret or private key, and one for verifying signatures which involves the user’s public key. The output of the signature process is called the “digital signature.”
Full Text Chapter Download: US $37.50 Add to Cart
Authentication and Error Resilience in Images Transmitted through Open Environment
A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender.
Full Text Chapter Download: US $37.50 Add to Cart
Teletranslation
A digital code that can be attached to an electronically transmitted message to uniquely identify its contents and the sender.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Protection for Online Gaming Applications
A digital signature aims to serve as the same purposes as a real-world signature. A sound digital signature ensures that the sender of the digital signature can be authenticated, the sender cannot later repudiate that she has sent the signed message, and a receiver cannot forge a digital signature (without being detected).
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Adoption: Guidelines and Mexican Case Review
Digital code generated by public encryption that adheres to a document transmitted electronically to verify its contents and the identity of the that sends it.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain and Its Integration as a Disruptive Technology
It is a mathematical scheme for presenting the authenticity of digital messages or documents, it uses public and private keys to encrypt and decrypt the data.
Full Text Chapter Download: US $37.50 Add to Cart
Hybrid Artificially Intelligent Multi-Layer Blockchain and Bitcoin Cryptology (AI-MLBBC): Anti-Crime-Theft Smart Wall Defense
A secure mathematical algorithm used to validate the credentials of digital documents and coded information associated with pre-approved signer to approve transactions.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication
A message digest encrypted with a private key, used as an electronic means of authentication.
Full Text Chapter Download: US $37.50 Add to Cart
Increasing the Trustworthiness of Online Gaming Applications
A digital signature aims to serve as the same purposes as a real-world signature. A sound digital signature ensures that the sender of the digital signature can be authenticated, the sender cannot later repudiate that she has sent the signed message, and a receiver cannot forge a digital signature (without being detected).
Full Text Chapter Download: US $37.50 Add to Cart
Sustainability Design Applied to the Digital Signature of Documents
From the Citizen Card it is possible to make the electronic signature through the Digital Mobile Key, speeding up the process of signing documents.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent Authentication and Authorization
An extra data appended to the message in order to authenticate the identity of the sender, and to ensure that the original content of the message or document that has been sent is unchanged.
Full Text Chapter Download: US $37.50 Add to Cart
The German Electronic Identity Card: Lessons Learned
Public-key cryptographic scheme that ensures authenticity and integrity of a document, and which also reaches the goal of non-repudiation (i.e. the holder of a private key cannot deny having signed a document if verification with the corresponding public key is successful).
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent Authentication and Authorization in E-Commerce
Extra data appended to the message in order to authenticate the identity of the sender, and to ensure that the original content of the message or document that has been sent is unchanged.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR