Commitment schemes
Secure multiparty computations
Electronic voting
Certification
Digital signature
< p>Cryptographic engineeringCrypto systems
1. Digital Signature:
This is a cryptographic method, based on the content of the EDI message With the private key when sending a letter, no one can generate the signature, so it is much safer than a handwritten signature. The recipient uses the sender's public key to verify the digital signature.
2. Digital Envelope:
This is a cryptographic method that uses the recipient’s public key to encrypt certain confidential information. After the recipient receives it, Then use your own private key to decrypt and read the confidential information. Except for the person who owns the private key, no one can decrypt the encrypted message even if it is obtained. It is like the information is packed in a strong envelope, and no one can open the envelope except the recipient. .
3. Secure reply note:
The recipient calculates the reply information based on the message content, then digitally signs it with the recipient’s private key and sends it back to the sender. On the one hand, it ensures that the content of the message received by the recipient is correct, and on the other hand, it also prevents the recipient from denying that he has received the original message.
4. Security certification:
After everyone generates their own public key, they apply for registration with a trustworthy security certification center, and the certification center is responsible for issuing certificates. To ensure the correspondence and correctness of personal identity and public key.