An Elliptic Curve Cryptography approach for Digital Signature in PDA devices
نویسندگان
چکیده
1. ABSTRACT-The problem undertaken for this paper is “An Elliptic Curve Cryptography approach for Digital Signature in PDA devices”. Digital transaction have become common place and in some cases inextricably linked to modern life. This technological dependency requires that information be unaltered and confidential. So in this paper, problem is to search a good secure technique, which ensures the confidentiality and privacy of message. Cryptography is one efficient way to ensure that if sent message fall into wrong hands, they cannot read it. It is the art of secret writing. Digital signature allows the verification of the ‘origin’ of messages. We use the concept of RSA (by Rivest, Shamir and Adleman) and Elliptic curve Algorithm to implement Digital Signature. Our problem is to find equation of polynomial such that it is too complex to design its elliptic curve. An elliptic-curve group for cryptography comes from the multiples of a generating point ‘G’ a two dimensional point on an elliptic curve over a finite field. In practice, the finite fields used are either integers modulo large primes, or a similar construction using 0/1 polynomials.
منابع مشابه
The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملA Novel Fair Tracing E-Cash System based on Elliptic Curve Discrete Logarithm Problem
In this paper we have designed a fair e-cash system using Schnorr’s one-time signature and Okamoto-Schnoor blind signature. In addition, the proposed e-cash system is constructed using elliptic curve cryptosystems (ECC) under the limited-storage environment for mobile devices such as smart cards, PDA etc able to efficiently store the coin streams. Furthermore, this system prevents criminal’s ac...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملProxy Blind Multi-signature Scheme using ECC for handheld devices
A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of two or more original signers without knowing the content of the message or document. It combines the advantages of proxy signature, blind signature and multi-signature scheme. This paper describes an efficient proxy blind multi-signature scheme. The secu...
متن کاملSoftware Elliptic Curve Cryptography
In this thesis, we study the software implementation of the NIST-recommended elliptic curves over prime fields. Our implementation goals are to achieve a fast, small, and portable cryptographic library, which supports elliptic curve digital signature generation and verification. The implementation results are presented on a Pentium I1 448.81 MHz. We also consider the sliding window algorithm (S...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013