A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme
2014
Mathematical Problems in Engineering
In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. ...
Many of the signature schemes are proposed in which thetout ofnthreshold schemes are deployed, but they still lack the property of security. ...
Acknowledgment The authors also wish to thank many anonymous referees for their suggestions to improve this paper. ...
doi:10.1155/2014/429271
fatcat:7t3ba24uvzccppnirrk344gcxe
A proxy partially blind signature approach using elliptic curve cryptosystem
2016
International Journal of Mathematics in Operational Research (IJMOR)
In this paper, we propose a new proxy partially blind signature scheme based on ECDL. ...
Several security analysis are shown to prove the security and the efficiency of the proposed scheme. ...
Conclusions In this paper, we proposed a simple and robust proxy partially blind signature scheme based on elliptic curve discrete logarithm. ...
doi:10.1504/ijmor.2016.073280
fatcat:chemjbdvmfccvcr4erfizrtqxq
An Efficient Organizational Signature Schemes based on the Elliptic Curve Cryptography
2014
International Journal of Applied Information Systems
In this paper, we introduce the notion of organizational signature schemes; show a construction of organizational signature schemes based on Elliptic Curve Cryptography (ECC) in the standard model. ...
Elliptic curves discrete logarithm problem (ECDLP) has a low computational cost and small key size, comparing with the factorization problem of RSA. ...
We present three schemes that fit into digital signature algorithm [11] model based on elliptic curve cryptosystem. We provide security properties proofs for our schemes. ...
doi:10.5120/ijais14-451251
fatcat:snxs3puaa5ft7dn4qcmeykkmfy
Security Analysis and Enhanced Construction on ECDLP-Based Proxy Blind Signature Scheme
2014
International Journal of e-Education, e-Business, e-Management and e-Learning
In the past years, many researchers have proposed proxy blind signature schemes based on DLP (Discrete Logarithm Problem) and ECDLP (Elliptic Curve DLP). ...
Therefore, we present an enhanced construction based on the ECDLP which can satisfy all security requirements of the proxy blind signature. ...
Next we review two proxy blind signature schemes based on Security Analysis and Enhanced Construction on ECDLP-Based Proxy Blind Signature Scheme
Chih-Hung Wang and Meng-Zhe Liao International Journal ...
doi:10.7763/ijeeee.2014.v4.300
fatcat:3ydo3hylq5fs7hr6didqmryxge
A novel proxy blind signcryption scheme based on hyper elliptic curve
2016
2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)
In this paper we design and analyze a proxy promised signcrypion scheme based on elliptic curve cryptosystem. ...
This ECC based scheme provides high security and efficiency. ...
Conclusion This paper presents the new scheme called proxy promised signcrypion. The security of a scheme realizes on bases of a hardiness of elliptic curve cryptosystem. ...
doi:10.1109/fskd.2016.7603481
dblp:conf/icnc/UllahJHSIH16
fatcat:ctlegglykng23fhvza2cpdqd4y
Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem
2006
Proceedings of the 9th Joint Conference on Information Sciences (JCIS)
This study presents an anonymous signcryption scheme based on the elliptic curve cryptosystem, which combines the properties of elliptic curve cryptosystem and ring signature. ...
While the signers are endowed with anonymity through the technique of ring signature, the elliptic curve cryptosystem achieves the advantages of high security, low computation load, and small bandwidth ...
Thus, in Section 2, there develops an anonymous signcryption scheme based on the elliptic curve cryptosystem, which combines the pros of ring signature scheme. ...
doi:10.2991/jcis.2006.235
dblp:conf/jcis/ChungWLC06
fatcat:2bxzyonncrbybkfrcdl5azxp3y
New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography
2017
KSII Transactions on Internet and Information Systems
Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography ...
Followed by the first construction given, Tan et al. [20] then introduce a new proxy blind signature schemes based on DLP (the discrete logarithm problem) and ECDLP (the elliptic curve discrete log problem ...
In the next section, we briefly introduce the basics of elliptic curve cryptography (ECC), and proxy blind signature protocols based on the elliptic curve discrete log problem (ECDLP). ...
doi:10.3837/tiis.2017.11.020
fatcat:zawcfyej4vek5kh3elpqdjpk3a
Key-Aggregate Cryptosystem based on Elliptic Curve Cryptography for Data Sharing in Cloud Storage with Result and Analysis
2018
International Journal of Computer Applications
We describe public-key encryption technique based on elliptic-curve theory which is used to create faster, smaller and more efficient cryptographic keys. ...
This encryption scheme [4] is invented for sharing number of keys at a time in broadcast scenario. ...
In this paper, to encrypt data effectively we propose a basic key-aggregate scheme based on elliptic curves which is public-key cryptosystem that assign decryption rights to multiple cipher text classes ...
doi:10.5120/ijca2018917265
fatcat:l2nddayds5h5hfyzbtxqrjcboa
Performance Analysis of RSA and Elliptic Curve Cryptography
2018
International Journal of Network Security
This paper presents a performance study and analysis of two popular public-key cryptosystems: RSA with its two variants, and ECC (Elliptic Curve Cryptography). ...
Besides studying and analyzing the paper also suggests the supremacy among these cryptosystems based on the experimentation. ...
Acknowledgments We would like to thank our colleagues, Head of Department of Computer Applications, Dean (R & C) and Director of our Institute for supporting directly or indirectly to this research work ...
dblp:journals/ijnsec/MahtoY18
fatcat:4qyc2b5vuba3hidwar73czu66m
Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme
2014
International Journal of Computer Network and Information Security
In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem. ...
Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. ...
CONCLUSIONS In this paper, we have reviewed improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem. ...
doi:10.5815/ijcnis.2014.04.06
fatcat:32zvu665xzhqff5pwp3jgigtje
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes
2007
Informatica
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. ...
However, this paper shows that the original signers can produce a valid signature as the proxy signer does in the proxy protected scheme. Therefore, Chen et al.' ...
Note that Sign d () can be any secure signature scheme based on elliptic curve such as (Pohlig and Hellman, 1978) . The result of whole signature is (m, Sign d (m), R, M w ). 6. ...
doi:10.15388/informatica.2007.162
fatcat:qock4g4lmjfshfoj6ho4kqomdu
Provable secure proxy signature scheme without bilinear pairings
2011
International Journal of Communication Systems
As per the literature, the relative computation cost of a pairing is approximately more than ten times of the scalar multiplication over elliptic curve group which indicates that pairing is a very expensive ...
Multi-proxy signature (MPS) allows an original signer to authorize a group of proxy signers as his proxy agent to sign co-operatively a message. ...
Security of the cryptosystem based on ECC relies on elliptic curve discrete log problem (ECDLP). ...
doi:10.1002/dac.1367
fatcat:e2qpr4pgjrbjxb4gc4x3wetf64
An Efficient Proxy Blind Signcryption Scheme for IoT
2022
Computers Materials & Continua
We designed a light weight and secure proxy blind signcryption for multi-digital messages based on a hyperelliptic curve (HEC). ...
Recent years have witnessed growing scientific research interest in the Internet of Things (IoT) technologies, which supports the development of a variety of applications such as health care, Industry ...
A blind signature scheme based on the integer factorization problem (IFP), which was initially proposed by Chaum [2] , relies on the solidity of the Rivest, Shamir, and Adleman (RSA) cryptosystem assumptions ...
doi:10.32604/cmc.2022.017318
fatcat:cxk7bvbvlvdwrjrfpwtiswfqlm
Provably Secure Proxy Multi-Signature Scheme Based on ECC
2014
Information Technology and Control
The elliptic curve cryptosystem (ECC) achieves the security level equivalent to that of digital signature algorithm (DSA), but has a lower computational cost and a smaller key size than the DSA. ...
Till now so many proxy multi-signature schemes based on ECC without pairings have been proposed. To the best of our knowledge, none of them are provable secure. ...
Acknowledgments The authors are grateful to the Editor and anonymous reviewers for their valuable comments and suggestions for improving an earlier version of the paper. ...
doi:10.5755/j01.itc.43.2.5377
fatcat:kolr4ttldzfknj25dnfsndy2ly
An Efficient ID-based Proxy Signcryption Scheme without Bilinear Pairings
2013
International Journal of Computer Applications
Signcryption based on elliptic curves provides the same level of security using smaller keys compared to schemes based on the discrete logarithm problem over finite fields. ...
Its security is based on the Elliptic Curve Discrete Logarithm Problem (ECDLP) with a reduced computational complexity compared to other schemes in literature. ...
G of points on the elliptic curve over Z p , find a number k such that k ; Q kP is called the discrete logarithm of Q to the base P . ...
doi:10.5120/13330-0817
fatcat:qpysow2givazrciaywwrx6wigi
« Previous
Showing results 1 — 15 out of 527 results