Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Proposed Developments of Elliptic Curve Digital Signature Algorithm
Authors: Sattar B. Sadkhan, Najlae Falah Hameed
Abstract:
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of DSA, where it is a digital signature scheme designed to provide a digital signature based on a secret number known only to the signer and also on the actual message being signed. These digital signatures are considered the digital counterparts to handwritten signatures, and are the basis for validating the authenticity of a connection. The security of these schemes results from the infeasibility to compute the signature without the private key. In this paper we introduce a proposed to development the original ECDSA with more complexity.Keywords: Elliptic Curve Digital Signature Algorithm, DSA.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1332470
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1678References:
[1] D. Johnson, A. Menezes, "The elliptic curve digital signature algorithm (ECDSA)", Center of Applied Cryptographic Research, University of Waterloo, Technical Report CORR99-34,1999.
[2] FibiÛkova, L., "Elliptic Curve Cryptography over Prime Fields", University of Essen, Germany, (2002).
[3] Jian-zhu Lu, Huo-yan Chen, "New message recovery signature schemes and its security", Mini-Micro Systems 24 (4) (2003) 695-697.
[4] Jurisic, A. and Menezes, A., "Elliptic Curves and Cryptography".
[5] N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation 48 (1987) 203-209.
[6] Oswald, E., "Introduction to Elliptic Curve Cryptography", Institute for Applied Information Processing and Communication, Graz University Technology, (2002).
[7] S.J. Hwang, C.C. Chang, W.P. Yang, "Authenticated encryption schemes with message linkages", Information Processing Letters 58 (1996) 189-194.
[8] V. Miller, "Use of elliptic curves in cryptography, in: Advances in cryptology", CRYPTO 85,Lecture Notes in Computer Science, vol. 218, Springer-Verlag, 1986, pp. 417-426.
[9] W.B. Lee, C.C. Chang, "Authenticated encryption schemes with linkage between message blocks", Information Processing Letters 63 (1997) 247-250.
[10] Y.M. Tseng, J.K. Jan, "An efficient authenticated encryption schemes with message linkages and low communication costs", Journal of Information and Engineering 18 (2002) 41-46.
[11] Zhi-chen Li, Yi-xian Yang, "New message recovery signature scheme", Acta Electronic Sinica 28 (1) (2000) 125-126.
[12] Zhi-chen Li, Zhong-xian Li, Yi-xian Yang, "A new forgery attack on message recovery signatures", Journal of China Institute of Communications 21 (5) (2000) 84-87.