Abstract

An Efficient and Secure Digital Multi-Signature Protocol Based on Ecc

Highlights

  • Digital Signature is a mathematical scheme which is meant for ensuring the properties such as authentication, integrity and non-repudiation of a digital message

  • In Johnson et al [6] it is revealed that Vanstone proposed Elliptic Curve Digital Signature Algorithm (ECDSA) in 1992, in response to National Institute for Standards and Technology [7] and was accepted in 1998 as an International Standards Organization (ISO 14888-3) standard [8], as an American National Standards Institute (ANSI X9.62) standard [9] in 1999 and as Institute of Electrical and Electronics Engineers (IEEE - I363-2000) standard [10] and NIST’s FIPS (FIPS 186-2) standard [11] in 2000

  • We propose an efficient and secure Digital Multi-Signature protocol which consists of a Setup phase, Key generation phase, Multi-Signature generation phase and Multi-Signature verification phase as follows: 2.1

Read more

Summary

INTRODUCTION

Digital Signature is a mathematical scheme which is meant for ensuring the properties such as authentication, integrity and non-repudiation of a digital message. The signer of a message is a single person who formulates a signature with the private key that can be verified by a verifier using the corresponding public key. There are cases in which multiple persons acts as signer and is referred as a multi-signature scheme. Itakura and Nakamura [13] proposed a public key cryptosystem for digital multi-signatures. Many other Digital multi-signature schemes were proposed by Chen et al [14], Harn and Ren [15] and Yang et al [16] using elliptic curve cryptosystem and RSA algorithm. Domıguez and Encinas [17] offered Java implementation for RSA based multi-signature scheme. Sahu and Sharma [18] proposed a multi-signature scheme based on Elliptic Curve Crypto system. Chande and Thakur [20] proposed a Multi-Signature scheme based on ECC for the wireless Network.

PROPOSED DIGITAL MULTI-SIGNATURE PROTOCOL
Compute the public key as
MULTI-SIGNATURE VERIFICATION PHASE
SECURITY ANALYSIS
PERFORMANCE ANALYSIS
CONCLUSIONS
FUTURE WORK
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.