跳至主要内容

Conventional and Improved Digital Signature Scheme: A Comparative Study

Read  full  paper  at:
http://www.scirp.org/journal/PaperInformation.aspx?PaperID=53456#.VMW11CzQrzE

ABSTRACT
Due to the rapid growth of online transactions on the Internet, authentication, non-repudiation and integrity are very essential security requirements for a secure transaction. To achieve these security goals, digital signature is the most efficient cryptographic primitive. Many authors have proposed this scheme and prove their security and evaluate the efficiency. In our paper, we present comprehensive study of conventional digital signature schemes based on RSA, DSA and ECDSA (Elliptic Curve Digital Signature Algorithm) and the improved version of these scheme.
 
Cite this paper
Alrehily, A. , Alotaibi, A. , Almutairy, S. , Alqhtani, M. and Kar, J. (2015) Conventional and Improved Digital Signature Scheme: A Comparative Study. Journal of Information Security, 6, 59-67. doi: 10.4236/jis.2015.61007.
 
References
[1]Roy, A. and Karforma, S. (2012) A Survey on Digital Signatures and Its Applications. Journal of Computer and Information Technology, 3, 45-69.
 
[2]Pallipamu, V., Reddy T.K. and Varma, S.P. (2014) A Survey on Digital Signatures. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 3, 7243-7246.
 
[3]Lin, I.C. and Chang, C.C. (2007) Security Enhancement for Digital Signature Schemes with Fault Tolerance in RSA. Information Sciences, 177, 4031-4039. http://dx.doi.org/10.1016/j.ins.2007.03.035
 
[4]Kar, J. (2012) Provably Secure Identity-Based Aggregate Signature Scheme. IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2012), Cyber Security and Privacy, Sanya, 10-12 October 2012, 137-142.
 
[5]Lin, I.C. and Wang, H.L. (2010) An Improved Digital Signature Scheme with Fault Tolerance in RSA. 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, 15-17 October 2010, 9-12.
 
[6]Xue, H. (2010) Improving the Fault-Tolerant Scheme Based on the RSA System. International Symposium on Computational Intelligence and Design, Hangzhou, 29-31 October 2010, 31-33.
 
[7]Hairong, Z., Rong, L., Lingl, L. and Ying, D. (2013) Improved Speed Digital Signature Algorithm Based on Modular Inverse. International Conference on Measurement, Information and Control, Harbin, 16-18 August 2013, 706-710.
 
[8]Han, G., Ma, C. and Cheng, Q. (2010) A Generalization of DSA Based on the Conjugacy Search Problem. International Workshop on Education Technology and Computer Science, 3, 348-351.
 
[9]Kar, J. (2014) Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, 16, 26-36.
 
[10]Junru, H. (2011) The Improved Elliptic Curve Digital Signature Algorithm. International Conference on Electronic & Mechanical Engineering and Information Technology, Harbin, 12-14 August 2011, 257-259.
 
[11]Li, H., Zhang, R., Yi, J. and Lv, H. (2013) A Novel Algorithm for Scalar Multiplication in ECDSA. 5th International Conference on Computational and Information Sciences, Shiyang, 21-23 June 2013, 943-946.
 
[12]Lamba, S. and Sharma, M. (2013) An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA). International Conference on Machine Intelligence Research and Advancement, Katra, 21-23 December 2013, 179-183. http://dx.doi.org/10.1109/ICMIRA.2013.41
 
[13]Kar, J. (2014) Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-04, 67-88.
 
[14]Kar, J. (2014) A Novel Construction of Certificateless Signcryption Scheme for Smart Card. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-22, 437-456.
 
[15]Si, H., Cai, Y. and Cheng, Z. (2010) An improved RSA signature algorithm based on complex numeric operation function. International Conference on Challenges in Environmental Science and Computer Engineering, Wuhan, 6-7 March 2010, 397-400.                                                                                       eww150126lx

评论

此博客中的热门博文

Electron Spin and Proton Spin in the Hydrogen and Hydrogen-Like Atomic Systems

Read full paper at: http://www.scirp.org/journal/PaperInformation.aspx?PaperID=52202#.VIj7tMnQrzE Author(s) Stanisław Olszewski * Affiliation(s) Institute of Physical Chemistry, Polish Academy of Sciences, Warsaw, Poland . ABSTRACT The mechanical angular momentum and magnetic moment of the electron and proton spin have been calculated semiclassically with the aid of the uncertainty principle for energy and time. The spin effects of both kinds of the elementary particles can be expressed in terms of similar formulae. The quantization of the spin motion has been done on the basis of the old quantum theory. It gives a quantum number n = 1/2 as the index of the spin state acceptable for both the electron and proton ...

Incorporation of High-Altitude Balloon Experiment in High School Science Classrooms

High-altitude balloon is a balloon, filled usually with helium or hydrogen that ascends into an area called “near space” or stratosphere. The most common type of high-altitude balloons are weather balloons. Other purposes include use as a platform for experiments in the upper atmosphere. Modern balloons generally contain electronic equipment such as radio transmitters, cameras, or satellite navigation systems, such as GPS receivers. The mission of the High-Altitude Balloon Experiment (HABE) is to acquire supporting data, validate enabling technologies, and resolve critical acquisition, tracking, and pointing (ATP) and fire control issues in support of future space-based precision pointing experiments. The use of high-altitude balloons offers a relatively low-cost, low-vibration test platform, a recoverable and reusable payload, worldwide launch capability, and a 'near- space' emulation of the future space systems operational scenarios. More recently, several university...

Fermented Brown Sugar Residue Prolongs the Caenorhabditis elegans Lifespan via DAF-16

Fermented brown sugar residue (FBSR) is generated in the course of purifying biomass ethanol from the yeast fermentation products of brown sugar. It contains abundant nutrition and is used in various industrial applications including as fertilizer and feed. Meanwhile, brown sugar has attracted attention as a health food and is thought to prevent cardiovascular diseases, hypertension, and brain stem diseases. Furthermore, polyphenol, contained in brown sugar, reduces oxidative stress and inhibits glucose absorption. DAF-16 is a transcription factor regulated downstream of the insulin signaling pathway and is one of the main factors contributing to aging and lifespan in C. elegans . Therefore, to determine the precise roles of the DAF-16 transcription factor in stress tolerance and life span, it is necessary to elucidate the signaling pathways involved in DAF-16 activation. This study was designed to elucidate the molecular mechanisms controlling the physiological stress toleran...