Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33123
Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: Proxy signature, fault tolerance, improved RSA, key agreement.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1125451

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1267

References:


[1] M. Mambo, K. Usuda, E. Okamoto, Proxy signature: delegation of the power to sign the message, IEICE Trans. Fundamentals E79-A (9) (1996) PP. 1338 - 1353.
[2] C.N. Zhang, “Integrated Approach for Fault Tolerance and Digital Signature in RSA,” IEEE Proceedings-Computers & Digital Techniques, vol. 146, no. 3, pp. 151-159, 1999
[3] N. Lee and W. Tsai, “Efficient Fault-tolerant Scheme basd on the RSA system,” IEEE Proceedings – Computer and Digital Techniques, vol. 150, no. 1, pp. 17-20, 2003.
[4] Iuon-Chang Lin and Hsing-Lei Wang, “An Improved Digital Signature Scheme with Fault Tolerance in RSA”, Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2010
[5] Shreenath Acharya, Sunaina Kotekar, Seema S Joshi, Shradda Shetty and Supreetha Lobo,” Implementing Digital Signature based Secured Card System for Online Transactions”, International Journal of Computer Applications 65(24):27-32, March 2013.
[6] R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[7] Nikita Somani and Dharmendra Mangal, “An Improved RSA Cryptographic System”, International Journal of Computer Applications 105(16):18-22, November 2014.
[8] B. Lee, H. Kim and K. Kim, “Secure mobile agent using strong non-designated proxy signature”, In: Information security and private (ACISP01), LNCS 2119, Springer-Verlag, (2001), pp. 474-486.
[9] B. Lee, H. Kim and K. Kim, “Strong proxy signature and its applications”, In: Proceeding of the 2001 symposium on cryptography and information security (SCIS01), vol. 2, no. 2, (2001), pp. 603-608.
[10] A. H. Al-Hamami and I. A. Aldariseh, "Enhanced Method for RSA Cryptosystem Algorithm," IEEE International Conference on Advanced Computer Science Applications and Technologies, pp. 402-408, 2012.
[11] D. Boneh, "Twenty Years of Attacks on the RSA Cryptosystem," Notices of the AMS, vol. 46, no. 2, pp. 203-213, 1999.
[12] Y. Desmedt and A. M. Odlyzko, "A Chosentext Attack on RSA Cryptosystem and some Discrete Logarithm Schemes," Advances in Cryptology CRYPTO ’85, vol. 218, pp. 5116-521, 1986.
[13] R. Kumar, "Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme," International journal of computer network and Information security, vol. 4, pp. 46-54, 2014.
[14] P. C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology-CRYPTO '96, pp. 104-113, 1996.
[15] Swati Verma and Birendra Kumar Sharma,” An Efficient Proxy Signature Scheme Based On RSA Cryptosystem,” International Journal of Advanced Science and Technology Vol. 51, February, 2013,pp.121-126
[16] H. Elkamchouchi, M. R. M. Rizk, and Fatma Ahmed,” A New Secure Protocol for Authenticated Key Agreement,” IACSIT International Journal of Engineering and Technology, Vol. 5, No. 2, April 2013,pp.245-248