Filters








527 Hits in 2.7 sec

Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

Raman Kumar, Nonika Singla
2014 Mathematical Problems in Engineering  
In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem.  ...  Many of the signature schemes are proposed in which thetout ofnthreshold schemes are deployed, but they still lack the property of security.  ...  Acknowledgment The authors also wish to thank many anonymous referees for their suggestions to improve this paper.  ... 
doi:10.1155/2014/429271 fatcat:7t3ba24uvzccppnirrk344gcxe

A proxy partially blind signature approach using elliptic curve cryptosystem

Nedal Tahat, Emad E. Abdallah
2016 International Journal of Mathematics in Operational Research (IJMOR)  
In this paper, we propose a new proxy partially blind signature scheme based on ECDL.  ...  Several security analysis are shown to prove the security and the efficiency of the proposed scheme.  ...  Conclusions In this paper, we proposed a simple and robust proxy partially blind signature scheme based on elliptic curve discrete logarithm.  ... 
doi:10.1504/ijmor.2016.073280 fatcat:chemjbdvmfccvcr4erfizrtqxq

An Efficient Organizational Signature Schemes based on the Elliptic Curve Cryptography

Shereen M.Mahgoub, Ali M. Allam, Ihab Abdel-Wahab Ali
2014 International Journal of Applied Information Systems  
In this paper, we introduce the notion of organizational signature schemes; show a construction of organizational signature schemes based on Elliptic Curve Cryptography (ECC) in the standard model.  ...  Elliptic curves discrete logarithm problem (ECDLP) has a low computational cost and small key size, comparing with the factorization problem of RSA.  ...  We present three schemes that fit into digital signature algorithm [11] model based on elliptic curve cryptosystem. We provide security properties proofs for our schemes.  ... 
doi:10.5120/ijais14-451251 fatcat:snxs3puaa5ft7dn4qcmeykkmfy

Security Analysis and Enhanced Construction on ECDLP-Based Proxy Blind Signature Scheme

Chih-Hung Wang
2014 International Journal of e-Education, e-Business, e-Management and e-Learning  
In the past years, many researchers have proposed proxy blind signature schemes based on DLP (Discrete Logarithm Problem) and ECDLP (Elliptic Curve DLP).  ...  Therefore, we present an enhanced construction based on the ECDLP which can satisfy all security requirements of the proxy blind signature.  ...  Next we review two proxy blind signature schemes based on Security Analysis and Enhanced Construction on ECDLP-Based Proxy Blind Signature Scheme Chih-Hung Wang and Meng-Zhe Liao International Journal  ... 
doi:10.7763/ijeeee.2014.v4.300 fatcat:3ydo3hylq5fs7hr6didqmryxge

A novel proxy blind signcryption scheme based on hyper elliptic curve

Sultan Ullah, Muhammad Junaid, Farwa Habib, Sana, Insafullah, Hizbullah
2016 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)  
In this paper we design and analyze a proxy promised signcrypion scheme based on elliptic curve cryptosystem.  ...  This ECC based scheme provides high security and efficiency.  ...  Conclusion This paper presents the new scheme called proxy promised signcrypion. The security of a scheme realizes on bases of a hardiness of elliptic curve cryptosystem.  ... 
doi:10.1109/fskd.2016.7603481 dblp:conf/icnc/UllahJHSIH16 fatcat:ctlegglykng23fhvza2cpdqd4y

Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem

Yu Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
2006 Proceedings of the 9th Joint Conference on Information Sciences (JCIS)  
This study presents an anonymous signcryption scheme based on the elliptic curve cryptosystem, which combines the properties of elliptic curve cryptosystem and ring signature.  ...  While the signers are endowed with anonymity through the technique of ring signature, the elliptic curve cryptosystem achieves the advantages of high security, low computation load, and small bandwidth  ...  Thus, in Section 2, there develops an anonymous signcryption scheme based on the elliptic curve cryptosystem, which combines the pros of ring signature scheme.  ... 
doi:10.2991/jcis.2006.235 dblp:conf/jcis/ChungWLC06 fatcat:2bxzyonncrbybkfrcdl5azxp3y

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

2017 KSII Transactions on Internet and Information Systems  
Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography  ...  Followed by the first construction given, Tan et al. [20] then introduce a new proxy blind signature schemes based on DLP (the discrete logarithm problem) and ECDLP (the elliptic curve discrete log problem  ...  In the next section, we briefly introduce the basics of elliptic curve cryptography (ECC), and proxy blind signature protocols based on the elliptic curve discrete log problem (ECDLP).  ... 
doi:10.3837/tiis.2017.11.020 fatcat:zawcfyej4vek5kh3elpqdjpk3a

Key-Aggregate Cryptosystem based on Elliptic Curve Cryptography for Data Sharing in Cloud Storage with Result and Analysis

Kulkarni Mayuri, V. R.
2018 International Journal of Computer Applications  
We describe public-key encryption technique based on elliptic-curve theory which is used to create faster, smaller and more efficient cryptographic keys.  ...  This encryption scheme [4] is invented for sharing number of keys at a time in broadcast scenario.  ...  In this paper, to encrypt data effectively we propose a basic key-aggregate scheme based on elliptic curves which is public-key cryptosystem that assign decryption rights to multiple cipher text classes  ... 
doi:10.5120/ijca2018917265 fatcat:l2nddayds5h5hfyzbtxqrjcboa

Performance Analysis of RSA and Elliptic Curve Cryptography

Dindayal Mahto, Dilip Kumar Yadav
2018 International Journal of Network Security  
This paper presents a performance study and analysis of two popular public-key cryptosystems: RSA with its two variants, and ECC (Elliptic Curve Cryptography).  ...  Besides studying and analyzing the paper also suggests the supremacy among these cryptosystems based on the experimentation.  ...  Acknowledgments We would like to thank our colleagues, Head of Department of Computer Applications, Dean (R & C) and Director of our Institute for supporting directly or indirectly to this research work  ... 
dblp:journals/ijnsec/MahtoY18 fatcat:4qyc2b5vuba3hidwar73czu66m

Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme

Raman Kumar
2014 International Journal of Computer Network and Information Security  
In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem.  ...  Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security.  ...  CONCLUSIONS In this paper, we have reviewed improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem.  ... 
doi:10.5815/ijcnis.2014.04.06 fatcat:32zvu665xzhqff5pwp3jgigtje

On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes

Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzonelih Hwang
2007 Informatica  
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem.  ...  However, this paper shows that the original signers can produce a valid signature as the proxy signer does in the proxy protected scheme. Therefore, Chen et al.'  ...  Note that Sign d () can be any secure signature scheme based on elliptic curve such as (Pohlig and Hellman, 1978) . The result of whole signature is (m, Sign d (m), R, M w ). 6.  ... 
doi:10.15388/informatica.2007.162 fatcat:qock4g4lmjfshfoj6ho4kqomdu

Provable secure proxy signature scheme without bilinear pairings

Namita Tiwari, Sahadeo Padhye
2011 International Journal of Communication Systems  
As per the literature, the relative computation cost of a pairing is approximately more than ten times of the scalar multiplication over elliptic curve group which indicates that pairing is a very expensive  ...  Multi-proxy signature (MPS) allows an original signer to authorize a group of proxy signers as his proxy agent to sign co-operatively a message.  ...  Security of the cryptosystem based on ECC relies on elliptic curve discrete log problem (ECDLP).  ... 
doi:10.1002/dac.1367 fatcat:e2qpr4pgjrbjxb4gc4x3wetf64

An Efficient Proxy Blind Signcryption Scheme for IoT

Aamer Khan, Insaf Ullah, Fahad Algarni, Muhammad Naeem, M. Irfan Uddin, Muhammad Asghar Khan
2022 Computers Materials & Continua  
We designed a light weight and secure proxy blind signcryption for multi-digital messages based on a hyperelliptic curve (HEC).  ...  Recent years have witnessed growing scientific research interest in the Internet of Things (IoT) technologies, which supports the development of a variety of applications such as health care, Industry  ...  A blind signature scheme based on the integer factorization problem (IFP), which was initially proposed by Chaum [2] , relies on the solidity of the Rivest, Shamir, and Adleman (RSA) cryptosystem assumptions  ... 
doi:10.32604/cmc.2022.017318 fatcat:cxk7bvbvlvdwrjrfpwtiswfqlm

Provably Secure Proxy Multi-Signature Scheme Based on ECC

N. Tiwari, S. Padhye, D. He
2014 Information Technology and Control  
The elliptic curve cryptosystem (ECC) achieves the security level equivalent to that of digital signature algorithm (DSA), but has a lower computational cost and a smaller key size than the DSA.  ...  Till now so many proxy multi-signature schemes based on ECC without pairings have been proposed. To the best of our knowledge, none of them are provable secure.  ...  Acknowledgments The authors are grateful to the Editor and anonymous reviewers for their valuable comments and suggestions for improving an earlier version of the paper.  ... 
doi:10.5755/j01.itc.43.2.5377 fatcat:kolr4ttldzfknj25dnfsndy2ly

An Efficient ID-based Proxy Signcryption Scheme without Bilinear Pairings

Hassan M.Elkamchouchi, Yasmine Abouelseoud, Eman F. Abu Elkhair
2013 International Journal of Computer Applications  
Signcryption based on elliptic curves provides the same level of security using smaller keys compared to schemes based on the discrete logarithm problem over finite fields.  ...  Its security is based on the Elliptic Curve Discrete Logarithm Problem (ECDLP) with a reduced computational complexity compared to other schemes in literature.  ...  G of points on the elliptic curve over Z p , find a number k such that k ; Q kP  is called the discrete logarithm of Q to the base P .  ... 
doi:10.5120/13330-0817 fatcat:qpysow2givazrciaywwrx6wigi
« Previous Showing results 1 — 15 out of 527 results