authentication mechanisms. Mobile users can now
sign contracts, approve transactions, and verify the
authenticity of documents directly from their
smartphones or tablets. This convenience not only
speeds up workflow, but also helps to reduce paper
usage and align with broader environmental
sustainability goals.
However, the implementation of digital signatures
in mobile devices is not without its limitations and
challenges. One notable limitation is the varying legal
recognition of digital signatures across jurisdictions.
While many countries have enacted legislation to
recognize the validity of digital signatures, the lack of
global standardization poses challenges for cross-
border transactions and collaborations. Harmonizing
legal frameworks to ensure the universal acceptance
of digital signatures remains an ongoing challenge.
In addition, the security of digital signatures on
mobile devices is an important issue. Mobile
platforms are susceptible to malicious software and
phishing attacks, which may compromise the private
keys associated with digital signatures. Developers
and security experts must continuously enhance
encryption protocols, develop powerful
authentication mechanisms, and introduce users to
the best solutions to mitigate these risks. In addition,
the challenge of implementing secure storage and
managing encryption keys on mobile devices requires
continuous innovation in both hardware and software.
The future prospects of the application of digital
signatures in mobile devices are very promising, with
the possibility of further development and widespread
adoption. A key area for future development is to
combine biometric authentication with digital
signatures. The use of fingerprint recognition, facial
recognition, or other biometric markers enhances the
security of digital signatures and reduces reliance on
traditional password-based authentication methods.
In addition, artificial intelligence methods can be also
introduced due to their excellent performance in
many tasks (Kayalibay et al. 2017, Qiu et al. 2022,
Mohassel & Zhang 2017). At the same time, the
development of blockchain technology has also
provided opportunities to enhance the integrity of
digital signatures. The decentralized and tamper proof
features of blockchain can be used to create
immutable records of digital signatures, providing
additional layers of trust and responsibility. Smart
contracts driven by blockchain technology can
automatically execute protocols after digital
signatures are verified, further simplifying business
processes. As the Internet of Things (IoT) continues
to proliferate, the application of digital signatures in
securing communication between interconnected
devices becomes increasingly relevant. Mobile
devices, serving as gateways to the IoT ecosystem,
can play a pivotal role in ensuring the integrity and
authenticity of data exchanged between devices. The
expansion of digital signature capabilities to
encompass IoT environments may pave the way for
more secure and reliable interconnected systems.
4 CONCLUSION
This work mainly discussed the basic concepts and
principles of digital signatures on mobile devices,
including related technologies such as digital
certificates, public key cryptography, and hash
functions. Among these methods, this paper mainly
discusses asymmetric cryptographic algorithms and
hash functions in detail. Meanwhile, after discussion,
it can be also found that the Digital signatures have
emerged as a secure and efficient means of verifying
the authenticity and integrity of digital documents or
transactions. Though the application of digital
signatures on mobile devices has advantages, the
security of digital signatures on mobile devices is still
a top priority. In the future, further studies will
address this security issue.
REFERENCES
B. Kayalibay, G. Jensen, P. van der Smagt. CNN-based
segmentation of medical imaging data, 2017.
https://arxiv.org/abs/1701.03056
DocuSign, Understanding digital signatures,
https://www.docusign.com/how-it-works/electronic-
signature/digital-signature/digital-signature-faq
N. Asokan, G. Tsudik, M. Waidner, JCS, 5, 1, 91-108
(1997)
Okta, Asymmetric Encryption: Definition, Architecture,
Usage, https://www.okta.com/identity-101/asymmetric
-encryption/
P. K. Janbandhu, M. Y. Siyal, A new biometric based
Signature system. in Proceedings of 3rd International
Conference on Information, Communication and Signal
Processing, ICICS (2018)
P. Mohassel, Y. Zhang. Secureml: A system for scalable
privacy-preserving machine learning. in Proceedings
of 2017 IEEE symposium on security and privacy (SP)
22, 19-38 (2017)
S. Rohde, T. Eisenbarth, E. Dahmen, J. Buchmann,
C. Paar. Fast hash-based signatures on
constrained devices. in Proceedings of InSmart
Card Research and Advanced Applications: 8th
IFIP WG 8.8/11.2 International Conference,
CARDIS (2008)