Besides the common use of signatures, it is also possible to hide and recover information in cryptographic signatures. One may argue that encryption, either symmetric or asymmetric, could be used to hide the information. But in some scenarios: Symmettic encryption would result in the problem of key distribution. Another misleading way would be to encrypt […]