5 research outputs found
Security Analysis of Liu-Zhang-Deng Digital Signature Scheme
AbstractIn 2010, Liu et al. 1 proposed an improvement of Liu-Li digital signature scheme without one-way hash function and messageredundancy. In this paper, we demonstrate that Liu et al.’s scheme exist ℓ-wDH problem. Using Baby-Step Giant Step, we cancompute (mod p − 1) in o polynomial time, it is therefore insecure and can not against forgery attack
Secure Message Recovery and Batch Verification using Digital Signature
This paper about the study of Secure message Recovery and batch verification using Digital Signature Security is increased in batch verification through triple DES algorithm Encryption is used for the Security in which the plaintext is transforming into the cipher text A digital signature scheme involves two phases the signature generation phase which is performed at the sender side and the signature verification phase that is performed by the receiver of that message In computer to computer communication the computer at sender s end usually transforms a plaintext into cipher text using encryption When the message is recovered at the Receiver Side than the original text is converted in to the encrypted text That encrypted text is secure for the authenticated person After recover the message if authentic person wants to get the original text then he she enter the key and take the plaintex
Certificateless and provably-secure digital signature scheme based on elliptic curve
With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They help in verifying the integrity of the data being exchanged. Elliptical curves are the strongest contenders in Digital Signatures, and much research is being done to enhance the method in many ways. The paper briefs a secured and improved ECDSA Elliptical Curve Digital Signature Algorithm which is an improved and secured version of the Digital Signature Algorithm