Today, all types of digital signature schemes emphasis on secure and best verification methods. Different digital signature schemes are used in order for the websites, security organizations, banks and so on to verify user's validity. Digital signature schemes are categorized to several types such as proxy, on-time, batch and so on. In this paper, different types of schemes are compared based on security level, efficiency, difficulty of algorithm and so on. Results show that best scheme depends on security, complexity and other important parameters. We tried simply to define the schemes and review them in practice.
[1]
Levente Buttyán,et al.
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
,
2010,
Comput. Commun..
[2]
Fagen Li,et al.
A biometric identity-based signcryption scheme
,
2012,
Future Gener. Comput. Syst..
[3]
Yupu Hu,et al.
Provably secure multi-proxy signature scheme with revocation in the standard model
,
2011,
Comput. Commun..
[4]
Jianhong Zhang,et al.
An efficient secure proxy verifiably encrypted signature scheme
,
2010,
J. Netw. Comput. Appl..
[5]
Alfred Menezes,et al.
Handbook of Applied Cryptography
,
2018
.