A method for obtaining digital signatures and public-key cryptosystems

@article{Rivest1978AMF,
  title={A method for obtaining digital signatures and public-key cryptosystems},
  author={R. Rivest and A. Shamir and L. Adleman},
  journal={Commun. ACM},
  year={1978},
  volume={21},
  pages={120-126}
}
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a… Expand
Probabilistic cryptosystem with two pairs of private/public keys
  • Reem Alfaifi
  • Computer Science
  • 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA)
  • 2017
An Efficient Key Distribution Protocol Based on BB84
Modified RSA Encryption Algorithm (MREA)
A Hybrid Digital Signature Technique using Cryptosystem
Self-certified digital signatures
...
1
2
3
4
5
...

References

A Fast Monte-Carlo Test for Primality