March 2018
Beginner to intermediate
656 pages
20h 9m
English
With this method, the sender encrypts the data using the receiver's public key and then digitally signs the encrypted data.
Various schemes, such as RSA, Digital Signature Algorithm (DSA), and ECDSA-based digital signature schemes are used in practice. RSA is the most commonly used; however, with the traction of ECC, ECDSA-based schemes are also becoming quite popular. This is beneficial in blockchains because ECC provides same level of security that RSA does, but it uses less space. Also, generation of keys is much faster in ECC as compared to RSA, therefore it helps ...