Issue |
ITM Web Conf.
Volume 73, 2025
International Workshop on Advanced Applications of Deep Learning in Image Processing (IWADI 2024)
|
|
---|---|---|
Article Number | 03009 | |
Number of page(s) | 5 | |
Section | Blockchain, AI, and Technology Integration | |
DOI | https://doi.org/10.1051/itmconf/20257303009 | |
Published online | 17 February 2025 |
A Comprehensive Study of Digital Signatures: Algorithms, Challenges and Future Prospects
College of Business Administration, California State Polytechnic University – Pomona, 91709 Pomona, United States
* Corresponding author: jingkunxu@cpp.edu
This article examines digital signature as a critical security measure for authentication and verification in electronic transactions, distinguishing them from simpler e-signatures by their use of advanced cryptographic techniques. Digital signature leverage asymmetric cryptography to provide higher security, with various standardised algorithms, such as the Digital Signature Algorithm (DSA) and Rivest- Shamir-Adleman (RSA), forming the foundation of secure systems today. The paper outlines the evolution of digital and electronic signature, from early telegraph-based approvals to the modern applications that facilitate secure digital contracts and communications. Key digital signature algorithms are analysed in detail, highlighting their strengths and weaknesses, including RSA, DSA, Elliptic Curve Digital Signature Algorithm (ECDSA), and Edwards-Curve Digital Signature Algorithm (EdDSA). Additionally, the article addresses the technical and implementation challenges of digital signature algorithms, such as high computational demands, complexities in key management, and difficulties in secure implementation. It concludes with an exploration of future trends, such as the development of efficient and quantum-resistant algorithms, improvements in cryptographic hardware, and new strategies to simplify secure key management. This comprehensive overview provides insights into both current digital signature practices and emerging solutions poised to enhance security and efficiency in an evolving digital landscape.
© The Authors, published by EDP Sciences, 2025
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.