A method for obtaining digital signatures and public-key cryptosystems

@article{Rivest1978AMF,
  title={A method for obtaining digital signatures and public-key cryptosystems},
  author={R. Rivest and A. Shamir and L. Adleman},
  journal={Commun. ACM},
  year={1978},
  volume={21},
  pages={120-126}
}
  • R. Rivest, A. Shamir, L. Adleman
  • Published 1978
  • Computer Science
  • Commun. ACM
  • An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a… CONTINUE READING
    How to Leak a Secret
    • 1,317
    • PDF
    On the security of public key protocols
    • 4,152
    • PDF
    Security Arguments for Digital Signatures and Blind Signatures
    • 1,603
    • Highly Influenced
    • PDF
    Fully homomorphic encryption using ideal lattices
    • 4,192
    • PDF
    Security of public-key cryptosystems based on Chebyshev polynomials
    • 238
    • PDF
    The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin
    • 950
    • PDF

    References

    Publications referenced by this paper.
    A Fast Monte-Carlo Test for Primality
    • 612
    • Highly Influential