Abstract
An Efficient and Secure Digital Multi-Signature Protocol Based on Ecc
Highlights
Digital Signature is a mathematical scheme which is meant for ensuring the properties such as authentication, integrity and non-repudiation of a digital message
In Johnson et al [6] it is revealed that Vanstone proposed Elliptic Curve Digital Signature Algorithm (ECDSA) in 1992, in response to National Institute for Standards and Technology [7] and was accepted in 1998 as an International Standards Organization (ISO 14888-3) standard [8], as an American National Standards Institute (ANSI X9.62) standard [9] in 1999 and as Institute of Electrical and Electronics Engineers (IEEE - I363-2000) standard [10] and NIST’s FIPS (FIPS 186-2) standard [11] in 2000
We propose an efficient and secure Digital Multi-Signature protocol which consists of a Setup phase, Key generation phase, Multi-Signature generation phase and Multi-Signature verification phase as follows: 2.1
Summary
Digital Signature is a mathematical scheme which is meant for ensuring the properties such as authentication, integrity and non-repudiation of a digital message. The signer of a message is a single person who formulates a signature with the private key that can be verified by a verifier using the corresponding public key. There are cases in which multiple persons acts as signer and is referred as a multi-signature scheme. Itakura and Nakamura [13] proposed a public key cryptosystem for digital multi-signatures. Many other Digital multi-signature schemes were proposed by Chen et al [14], Harn and Ren [15] and Yang et al [16] using elliptic curve cryptosystem and RSA algorithm. Domıguez and Encinas [17] offered Java implementation for RSA based multi-signature scheme. Sahu and Sharma [18] proposed a multi-signature scheme based on Elliptic Curve Crypto system. Chande and Thakur [20] proposed a Multi-Signature scheme based on ECC for the wireless Network.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Similar Papers
More From: International Journal on Cryptography and Information Security
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.