The direct digital signature only involves the correspondence side.It supposes the receiving end to know the transmitting end the public key.The digital signature carries on the encryption or the use transmitting end private key through the use transmitting end private key to the entire news disperses a row code to the news to carry on the encryption to have
the confirmation pattern to rely on when must deny in the transmitting end
security key - transmitting end to transmit some news, possibly can declare its private key loses or is stolen, thus other people fabricated his signature
- usually to need to use with the private key security correlation administration control method stops or at least weakens this kind of situation, but threatened still has -
the improvement way for example to be possible to a certain extent to request the information which signed to contain time to poke (date and time), and will request alreadyThe exposed key reported is stolen truly for
authorized center X certain private keys in time T, the enemy side may fabricate X signature early in or is equal to time T the time stamp
温馨提示:内容为网友见解,仅供参考