5 research outputs found

    Security Analysis of Liu-Zhang-Deng Digital Signature Scheme

    Get PDF
    AbstractIn 2010, Liu et al. 1 proposed an improvement of Liu-Li digital signature scheme without one-way hash function and messageredundancy. In this paper, we demonstrate that Liu et al.’s scheme exist ℓ-wDH problem. Using Baby-Step Giant Step, we cancompute (mod p − 1) in o polynomial time, it is therefore insecure and can not against forgery attack

    Secure Message Recovery and Batch Verification using Digital Signature

    Get PDF
    This paper about the study of Secure message Recovery and batch verification using Digital Signature Security is increased in batch verification through triple DES algorithm Encryption is used for the Security in which the plaintext is transforming into the cipher text A digital signature scheme involves two phases the signature generation phase which is performed at the sender side and the signature verification phase that is performed by the receiver of that message In computer to computer communication the computer at sender s end usually transforms a plaintext into cipher text using encryption When the message is recovered at the Receiver Side than the original text is converted in to the encrypted text That encrypted text is secure for the authenticated person After recover the message if authentic person wants to get the original text then he she enter the key and take the plaintex

    Certificateless and provably-secure digital signature scheme based on elliptic curve

    Get PDF
    With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They help in verifying the integrity of the data being exchanged. Elliptical curves are the strongest contenders in Digital Signatures, and much research is being done to enhance the method in many ways. The paper briefs a secured and improved ECDSA Elliptical Curve Digital Signature Algorithm which is an improved and secured version of the Digital Signature Algorithm
    corecore