The document presents a new efficient and secure digital multi-signature protocol based on elliptic curve cryptography. The proposed protocol reduces time complexity compared to previous schemes. It consists of setup, key generation, signature generation, and verification phases. The signature generation is efficient and distributed among group members. The protocol is secure against insider attacks and difficult to forge signatures due to the difficulty of solving the elliptic curve discrete logarithm problem. Performance analysis shows the proposed protocol has lower time complexity than previous digital multi-signature schemes.
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEijcisjournal
The certificate-based cryptosystems is traditional way in providing the system parameters. Identity-based
cryptography is more efficient than certificate-based cryptosystems. Each user in identity-based
cryptography uses any arbitrary string that uniquely identifies him as his public key. This paper proposes
a new identity-based tripartite signcryption scheme based on the elliptic curve discrete logarithm problem.
The proposed id-based tripartite signcryption scheme does not use the bilinear pairings in both the
Signcryption and unsigncryption phases. The proposed scheme used to reduce the communication over
head when three entities wants to communicate securely as in authentication protocol in GSM and in ecommerce.
The proposed scheme satisfies various desirable security properties. Also, the performance of
the proposed scheme is tested.
Different types of Authentications described in different scenarios. Basically a survey paper on Different kinds of authentications in different scenarios.
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol ijujournal
In this paper, we analyze the security vulnerabilities of SSL-MAP, an ultra-lightweight RFID mutual
authentication protocol recently proposed by Rama N, Suganya R. We present two effective attacks, a desynchronization attack and a full-disclosure attack, against this protocol. The former permanently disables
the authentication capability of a RFID tag by destroying synchronization between the tag and the RFID
reader. The latter completely threats a tag by extracting all the secret information that are stored in the
tag. The de-synchronization attack can be carried out in three round of interaction in SSL-MAP while the
full-disclosure attack is accomplished across several runs of SSL-MAP. We also discuss ways to counter
the attacks.
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEMZac Darcy
Signcryption is a cryptographic primitive which simultaneously provides both confidentiality and
authenticity in a single logical step. In a proxy signature scheme, an original signer delegates his signing
power to a proxy agent, who signs a message on behalf of him. This paper introduces a new proxy
signcryption scheme based on the Discrete Logarithm Problem (DLP) with a reduced computational
complexity compared to other schemes in literature. In this proposed scheme, the receiver is the only one
who can verify the origin of the ciphertext. Moreover, in this scheme, an authorized proxy signcrypter can
create valid proxy signatures after verifying the identity of the original signcrypter. The proposed scheme
achieves the various desirable security requirements. An elliptic curve based version of the proposed proxy
signcryption scheme has been implemented using Mathematica for realistic (256-bit) parameters to
emphasize the ease of its practical use.
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESIJNSA Journal
Signcryption is a cryptographic primitive which performs encryption and signature in a single logical step with the cost lower than signature-then-encryption approach. Recently, Li et al. [35] proposed the first provable secure identity based signcryption without random oracles. In their scheme sender signs the ciphertext. However, in [11] Boyen showed that non-repudiation is easily achieved if the sender sign the plaintext rather than ciphertext. In this paper we proposed an identity based signcryption scheme without random oracles, which provides the non-repudiation with respect to plaintext. We also proposed an identity based public verifiable signcryption scheme with third party verification in the standard model.
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEijcisjournal
The certificate-based cryptosystems is traditional way in providing the system parameters. Identity-based
cryptography is more efficient than certificate-based cryptosystems. Each user in identity-based
cryptography uses any arbitrary string that uniquely identifies him as his public key. This paper proposes
a new identity-based tripartite signcryption scheme based on the elliptic curve discrete logarithm problem.
The proposed id-based tripartite signcryption scheme does not use the bilinear pairings in both the
Signcryption and unsigncryption phases. The proposed scheme used to reduce the communication over
head when three entities wants to communicate securely as in authentication protocol in GSM and in ecommerce.
The proposed scheme satisfies various desirable security properties. Also, the performance of
the proposed scheme is tested.
Different types of Authentications described in different scenarios. Basically a survey paper on Different kinds of authentications in different scenarios.
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol ijujournal
In this paper, we analyze the security vulnerabilities of SSL-MAP, an ultra-lightweight RFID mutual
authentication protocol recently proposed by Rama N, Suganya R. We present two effective attacks, a desynchronization attack and a full-disclosure attack, against this protocol. The former permanently disables
the authentication capability of a RFID tag by destroying synchronization between the tag and the RFID
reader. The latter completely threats a tag by extracting all the secret information that are stored in the
tag. The de-synchronization attack can be carried out in three round of interaction in SSL-MAP while the
full-disclosure attack is accomplished across several runs of SSL-MAP. We also discuss ways to counter
the attacks.
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEMZac Darcy
Signcryption is a cryptographic primitive which simultaneously provides both confidentiality and
authenticity in a single logical step. In a proxy signature scheme, an original signer delegates his signing
power to a proxy agent, who signs a message on behalf of him. This paper introduces a new proxy
signcryption scheme based on the Discrete Logarithm Problem (DLP) with a reduced computational
complexity compared to other schemes in literature. In this proposed scheme, the receiver is the only one
who can verify the origin of the ciphertext. Moreover, in this scheme, an authorized proxy signcrypter can
create valid proxy signatures after verifying the identity of the original signcrypter. The proposed scheme
achieves the various desirable security requirements. An elliptic curve based version of the proposed proxy
signcryption scheme has been implemented using Mathematica for realistic (256-bit) parameters to
emphasize the ease of its practical use.
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESIJNSA Journal
Signcryption is a cryptographic primitive which performs encryption and signature in a single logical step with the cost lower than signature-then-encryption approach. Recently, Li et al. [35] proposed the first provable secure identity based signcryption without random oracles. In their scheme sender signs the ciphertext. However, in [11] Boyen showed that non-repudiation is easily achieved if the sender sign the plaintext rather than ciphertext. In this paper we proposed an identity based signcryption scheme without random oracles, which provides the non-repudiation with respect to plaintext. We also proposed an identity based public verifiable signcryption scheme with third party verification in the standard model.
Key Management, Diffie-Hellman Key Exchange, Elliptic Curve Arithmetic, Elliptic Curve
Cryptography, Message Authentication and Hash Functions, Hash and MAC Algorithms
Digital Signatures and Authentication Protocols
A Proxy signature scheme enables a proxy signer to sign a message on behalf of
the original signer. In this paper, we propose ECDLP based solution for chen et. al [1]
scheme. We describe efficient and secure Proxy multi signature scheme that satisfy all the
proxy requirements and require only elliptic curve multiplication and elliptic curve addition
which needs less computation overhead compared to modular exponentiations also our
scheme is withstand against original signer forgery and public key substitution attack.
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...IJNSA Journal
The existing authenticated session key establishment protocols are either vulnerable to dictionary attack on identity privacy of a client or the methods adopted to resist this attack are found to be computationally inefficient. This paper proposes a new authenticated key establishment protocol which uses elliptic curve based DDH problem. The protocol provides identity privacy of the client in addition to the other security properties needed for a session key establishment protocol. In comparison with the existing protocols, the proposed protocol offers equivalent security with less parameters resulting in lower computational load, communication bandwidth cost, power consumption and memory requirement.
Authentication system for e-certificate by using RSA’s digital signatureTELKOMNIKA JOURNAL
Online learning and teaching become the popular channel for all participants, because they can access the courses everywhere with the high-speed internet. E-certificate is being prepared for everyone who has participated or passed the requirements of the courses. Because of many benefits frome-certificate, it may become the demand for intruders to counterfeit the certificate. In this paper, Rivest-Shamir-Adleman (RSA)’s digital signature is chosen to signe-certificate in order to avoid being counterfeited by intruders. There are two applications to managee-certificate. The first application is the signing application to sign the sub image including only participant’s name in e-certificate. In general, the file of digital signature is divided frome-certificate. That means, both of them must be selected to compare each other in checking application. In fact, the solution will be approved when each pixel of participant’s name is equal to each part from the decrypted message at the same position. In experimental session, 40 e-certificatesare chosen for the implementation. The results reveal that the accuracy is 100% and both of signing and checking processes are completed rapidly fast, especially when signing application is applied with Chinese remainder theorem (CRT) or the special technique of CRT. Therefore, the proposed method is one of the best solutions to protect e-certificate from the forgery by intruders.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYIJNSA Journal
In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the notion of conditional proxy re-encryption (C-PRE) with bilinear pairings. Later, a break for the same was published in [17] and a new C-PRE scheme with bilinear pairings was introduced. In C-PRE, the proxy also needs to have the right condition key to transform the ciphertext (associated with a condition set by Alice) under Alice's public key into ciphertext under Bob's public key, so that Bob can decrypt it. In this paper, we propose an efficient C-PRE scheme which uses substantially less number of bilinear pairings when compared to the existing one [17]. We then prove its chosen-ciphertext security under modified Computational Diffie-Hellman (mCDH) and modified Computational Bilinear Diffie-Hellman (mCBDH) assumptions in the random oracle model.
RSA ALGORITHM WITH A NEW APPROACH ENCRYPTION AND DECRYPTION MESSAGE TEXT BY A...ijcisjournal
In many research works, there has been an orientation to studying and developing many of the applications of public-key cryptography to secure the data while transmitting in the systems, In this paper we present an approach to encrypt and decrypt the message text according to the ASCII(American Standard Code for Information Interchange) and RSA algorithm by converting the message text into binary representation and dividing this representation to bytes(8s of 0s and 1s) and applying a bijective function between the group of those bytes and the group of characters of ASCII and then using this mechanism to be compatible with using RSA algorithm, finally, Java application was built to apply this approach directly.
Shift Invarient and Eigen Feature Based Image Fusion ijcisjournal
Image fusion is a technique of fusing multiple images for better information and more accurate image
compared input images. Image fusion has applications in biomedical imaging, remote sensing, pattern
recognition, multi-focus image integration, and modern military. The proposed methodology uses benefits
of Stationary Wavelet Transform (SWT) and Principal Component Analysis (PCA) to fuse the two images.
The obtained results are compared with exiting methodologies and shows robustness in terms of entropy,
Peak Signal to Noise Ratio (PSNR) and standard deviation.
Key Management, Diffie-Hellman Key Exchange, Elliptic Curve Arithmetic, Elliptic Curve
Cryptography, Message Authentication and Hash Functions, Hash and MAC Algorithms
Digital Signatures and Authentication Protocols
A Proxy signature scheme enables a proxy signer to sign a message on behalf of
the original signer. In this paper, we propose ECDLP based solution for chen et. al [1]
scheme. We describe efficient and secure Proxy multi signature scheme that satisfy all the
proxy requirements and require only elliptic curve multiplication and elliptic curve addition
which needs less computation overhead compared to modular exponentiations also our
scheme is withstand against original signer forgery and public key substitution attack.
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...IJNSA Journal
The existing authenticated session key establishment protocols are either vulnerable to dictionary attack on identity privacy of a client or the methods adopted to resist this attack are found to be computationally inefficient. This paper proposes a new authenticated key establishment protocol which uses elliptic curve based DDH problem. The protocol provides identity privacy of the client in addition to the other security properties needed for a session key establishment protocol. In comparison with the existing protocols, the proposed protocol offers equivalent security with less parameters resulting in lower computational load, communication bandwidth cost, power consumption and memory requirement.
Authentication system for e-certificate by using RSA’s digital signatureTELKOMNIKA JOURNAL
Online learning and teaching become the popular channel for all participants, because they can access the courses everywhere with the high-speed internet. E-certificate is being prepared for everyone who has participated or passed the requirements of the courses. Because of many benefits frome-certificate, it may become the demand for intruders to counterfeit the certificate. In this paper, Rivest-Shamir-Adleman (RSA)’s digital signature is chosen to signe-certificate in order to avoid being counterfeited by intruders. There are two applications to managee-certificate. The first application is the signing application to sign the sub image including only participant’s name in e-certificate. In general, the file of digital signature is divided frome-certificate. That means, both of them must be selected to compare each other in checking application. In fact, the solution will be approved when each pixel of participant’s name is equal to each part from the decrypted message at the same position. In experimental session, 40 e-certificatesare chosen for the implementation. The results reveal that the accuracy is 100% and both of signing and checking processes are completed rapidly fast, especially when signing application is applied with Chinese remainder theorem (CRT) or the special technique of CRT. Therefore, the proposed method is one of the best solutions to protect e-certificate from the forgery by intruders.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYIJNSA Journal
In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the notion of conditional proxy re-encryption (C-PRE) with bilinear pairings. Later, a break for the same was published in [17] and a new C-PRE scheme with bilinear pairings was introduced. In C-PRE, the proxy also needs to have the right condition key to transform the ciphertext (associated with a condition set by Alice) under Alice's public key into ciphertext under Bob's public key, so that Bob can decrypt it. In this paper, we propose an efficient C-PRE scheme which uses substantially less number of bilinear pairings when compared to the existing one [17]. We then prove its chosen-ciphertext security under modified Computational Diffie-Hellman (mCDH) and modified Computational Bilinear Diffie-Hellman (mCBDH) assumptions in the random oracle model.
RSA ALGORITHM WITH A NEW APPROACH ENCRYPTION AND DECRYPTION MESSAGE TEXT BY A...ijcisjournal
In many research works, there has been an orientation to studying and developing many of the applications of public-key cryptography to secure the data while transmitting in the systems, In this paper we present an approach to encrypt and decrypt the message text according to the ASCII(American Standard Code for Information Interchange) and RSA algorithm by converting the message text into binary representation and dividing this representation to bytes(8s of 0s and 1s) and applying a bijective function between the group of those bytes and the group of characters of ASCII and then using this mechanism to be compatible with using RSA algorithm, finally, Java application was built to apply this approach directly.
Shift Invarient and Eigen Feature Based Image Fusion ijcisjournal
Image fusion is a technique of fusing multiple images for better information and more accurate image
compared input images. Image fusion has applications in biomedical imaging, remote sensing, pattern
recognition, multi-focus image integration, and modern military. The proposed methodology uses benefits
of Stationary Wavelet Transform (SWT) and Principal Component Analysis (PCA) to fuse the two images.
The obtained results are compared with exiting methodologies and shows robustness in terms of entropy,
Peak Signal to Noise Ratio (PSNR) and standard deviation.
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...ijcisjournal
Recently the demand of mobile phones and their applications are increasing rapidly and as a result, it
becomes essential to design and/or improve the existing PKI (Public Key Infrastructure) useful for mobile
phones or devices. Since a mobile phone has small screen, low computing power, small storage capacity
etc, the present paper proposes an ECC-based mobile-PKI that overcomes these limitations and supports
various mobile-based applications, because the use of ECC significantly reduces the computation cost,
message size and transmission overhead over RSA based PKI as 160-bit key-size in ECC provides
comparable security with 1024-bit key in RSA. Also the proposed method includes a Mobile Home Agent
(MHA) per user and a Registration Authority (RA) that further minimize the major work/processing loads
of mobile phone and Certificate Authority (CA), respectively. This paper addresses a secure
implementation of the proposed M-PKI, whose security analysis against different attacks shows that all
attacks are protected. Finally, a comparative study of the M-PKI with the existing PKI is done, which gives
satisfactory performance.
Error Correction for Parallel FIR Filters Using Hamming Codesijcisjournal
In this paper ,we propose a error correction for parallel FIR filters using Hamming code in which single
parallel FIR filter is taken as a bit in ECC technique. In many complex circuits, reliability plays a crucial
role and it requires fault tolerant filter implementations. Now a days, technology grows up, the complex
system use many filters which operates simultaneously. Consider an example in which same parallel filter
is applied to different inputs. To achieve fault tolerance, an ECC technique uses the presence of parallel
filters are considered. The ECC technique provides protection where more number of parallel filters are
used by using the case study, the effectiveness in error correction and circuit design cost is evaluated.
Automatic tempest test and analysis systemijcisjournal
Today, it is clearly known that the electronic devices generate electromagnetic radiations unintentionally,
which may contain critical information called compromising emanations (CE). CE is also known as
TEMPEST radiation, which is a code name firstly used by an U.S government program. Every developed
country has a TEMPEST Test Laboratory (TTL) connected to their National Security Agency (NSA). The
main objective of these laboratories is to investigate equipment, systems, and platforms processing
cryptographic information in terms of CE. TEMPEST tests might take very long time depending on the item
under test. In this paper, a complete Automatic TEMPEST Test and Analysis System (ATTAS) developed in
TUBITAK, BILGEM TTL is introduced. The system has the following properties, which are automatic
system calibration unit, automatic test matrix generator based on the SDIP-27/1 standard, implementation
of tunable and nontunable tests, automatic CE investigations, rendering of the CE of video display units,
playing of the CE of audio signals, measurement of detection system sensitivity, zoning of TEMPEST
equipment based on SDIP-28 standard, and generation of graphical results.
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm using metaheuristics
and in particular genetic algorithms. The classic fitness function when using such an algorithm
is to compare n-gram statistics of a the decrypted message with those of the target message. We show that
using such a function is irrelevant in case of Genetic Algorithm, simply because there is no correlation
between the distance to the real key (the optimum) and the value of the fitness, in other words, there is no
hidden gradient. In order to emphasize this assumption we experimentally show that a genetic algorithm
perform worse than a random search on the cryptanalysis of the simplified data encryption standard
algorithm.
A proposed assessment metrics for image steganographyijcisjournal
Data security has become an important problem in the communication systems. Steganography is used to
hide existence of a secret-message. In this article a modified Steganography algorithm will be proposed
depending on decomposition principle of both secret-message and cover-image. A fuzzification is
performed in the secret message to optimize the decomposed coefficients before embedding in the coverimage
to get a Stego Image. The well known metrics (Cor., MSE, PSNR, and Entropy) were used to
evaluate the modified algorithm. Also, a trade-off factor was introduced to determine an optimum value for
the embedding strength factor to get an acceptable degradation. Moreover to evaluate and assess the
modified algorithm and any Steganography algorithms, a new histogram metrics are proposed which
represents the relative frequency occurrence of the various images.
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSijcisjournal
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in
1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was
replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the
FIPS. Most of the widely used cryptographic hash functions are under attack today. With the need to
maintain a certain level of security, NIST had selected new cryptographic hash function through public
competition. The winning algorithm, Keccak will not only have to establish a strong security, but also has
to exhibit good performance and capability to run. In this context, we have analysed SHA-3 finalists along
with the used standard SHA-2. The performances of respective algorithms are evaluated by computing
cycles per byte. The empirical analysis shows that two SHA-3 finalists viz. Skein and BLAKE perform better
which are nearly same as the performance of SHA-2.
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...ijcisjournal
This paper presents a new encryption scheme called Compact Coding that encodes information in time, phase, and intensity domains, simultaneously. While these approaches have previously been used one at a time, the proposed scheme brings to bear for the first time their strengths simultaneously leading to an increase in the secure information transfer rate. The proposed scheme is applicable to both optical fibers and free space optics, and can be considered as an alternative to polarization coding. This paper applies the proposed compact coding scheme to multi-photon tolerant quantum protocols in order to produce quantum-level security during information transfer. We present the structure of the proposed coding scheme in a multi-photon environment and address its operation.
Performance Analysis of CRT for Image Encryption ijcisjournal
With the fast advancements of information technology, the security of image data transmitted or stored over
internet is become very difficult. To hide the details, an effective method is encryption, so that only
authorized persons can decrypt the image with the keys available. Since the default features of digital
image such as high capacity data, large redundancy and large similarities among pixels, the conventional
encryption algorithms such as AES, , DES, 3DES, and Blow Fish, are not applicable for real time image
encryption. This paper presents the performance of CRT for image encryption to secure storage and
transmission of image over internet.
Framework for Securing Educational E-Government Serviceijcisjournal
Enhancement in technology is leading to a change in the way governments, individuals, institutions and
business entities provide quality services to the citizen. Today's education system plays crucial role for
developing cognizance in society so e-government service is obliged to integrate with educational system.
In this work we proposed a novel framework for integrating educational service within e-government
services. One of the main tasks of this paper is to explore or propose a Secure Examination Management
System (SEMS). The system has been designed using cryptographic primitives, which enables students to
take the exam from anywhere. The student is allowed to take the exam after he gives his necessary
authentication details. In SEMS, it is important to exclude false students while ensuring the privacy for the
honest students. It allows evaluators to share student examination papers for evaluation with proper
authentication. This is done using digital signatures, authentication and confidentiality provided by public
key cryptographic system.
Nowadays, the information processing system plays crucial part in the internet. Online information security
has become the top priority in all sectors. Failing to provide online information security may cause loss of
critical information or someone may use or distribute such information for malicious purpose. Recently QR
barcodes have been used as an effective way to securely share information. This paper presents the survey
on information hiding techniques which can share high security information over network using QR
barcode
Global stabilization of a class of nonlinear system based on reduced order st...ijcisjournal
The problem of global stabilization for a class of nonlinear system is considered in this paper.The sufficient
condition of the global stabilization of this class of system is obtained by deducing thestabilization of itself
from the stabilization of its subsystems. This paper will come up with a designmethod of state feedback
control law to make this class of nonlinear system stable, and indicate the efficiency of the conclusion of
this paper via a series of examples and simulations at the end. Theresults presented in this paper improve
and generalize the corresponding results of recent works.
Design of Processing Element (PE3) for Implementing Pipeline FFT Processor ijcisjournal
Multiplexing is a method by which multiple analog message signals or digital data streams are combined
into one signal over a shared medium. In communication, different multiplexing schemes are used. To
achieve higher data rates, Orthogonal Frequency Division Multiplexing (OFDM) is used due to its high
spectral efficiency. OFDM became a serious alternative for modern digital signal processing methods
based on the Fast Fourier Transform (FFT).The problems with Orthogonal subcarriers can be addressed
with FFT in communication applications. An 8-bit processing element (PE3), used in the execution of a
pipeline FFT processoris designed and presented in this paper. Simulations are carried out using Mentor
Graphics tools in 130nm technology.
Randomness evaluation framework of cryptographic algorithmsijcisjournal
Nowadays, computer systems are developing very rapidly and become more and more complex, which
leads to the necessity to provide security for them. This paper is intended to present software for testing
and evaluating cryptographic algorithms. When evaluating block and stream ciphers one of the most basic
property expected from them is to pass statistical randomness testing, demonstrating in this way their
suitability to be random number generators. The primary goal of this paper is to propose a new framework
to evaluate the randomness of cryptographic algorithms: based only on a .dll file which offers access to the
encryption function, the decryption function and the key schedule function of the cipher that has to be tested
(block cipher or stream cipher), the application evaluates the randomness and provides an interpretation of
the results. For this, all nine tests used for evaluation of AES candidate block ciphers and three NIST
statistical tests are applied to the algorithm being tested. In this paper, we have evaluated Tiny Encryption
Algorithm (block cipher), Camellia (block cipher) and LEX (stream cipher) to determine if they pass
statistical randomness testing.
Secure routing path using trust values forijcisjournal
Traditional cryptography-based security mechanisms such as authentication and authorization are not
effective against insider attacks like wormhole, sinkhole, selective forwarding attacks, etc., Trust based
approaches have been widely used to counter insider attacks in wireless sensor networks. It provides a
quantitative way to evaluate the trustworthiness of sensor nodes. An untrustworthy node can wreak
considerable damage and adversely affect the quality and reliability of data. Therefore, analyzing the trust
level of a node is important. In this paper we focused about indirect trust mechanism, in which each node
monitors the forwarding behavior of its neighbors in order to detect any node that behaves selfishly and
does not forward the packets it receives. For this, we used a link state routing protocol based indirect
trusts which forms the shortest route and finds the best trustworthy route among them by comparing the
values of all the calculated route trusts as for each route present in the network. And finally, we compare
our work with similar routing protocols and show its advantages over them.
A Secure Color Image Steganography in Transform Domain ijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENTijcisjournal
In this paper, we consider an RSA modulus N=pq, where the prime factors p, q are of the same size. We
present an attack on RSA when the decryption exponent d is in the form d=Md1+d0 where M is a given
positive integer and d1 and d0 are two suitably small unknown integers. In 1999, Boneh and Durfee
presented an attack on RSA when
0.292 d < N . When d=Md1+d0, our attack enables one to overcome
Boneh and Durfee's bound and to factor the RSA modulus
Guillou-quisquater protocol for user authentication based on zero knowledge p...TELKOMNIKA JOURNAL
Authentication is the act of confirming the validity of someone’s personal data. In the traditional
authentication system, username and password are sent to the server for verification. However, this
scheme is not secure, because the password can be sniffed. In addition, the server will keep the user’s
password for the authentication. This makes the system vulnerable when the database server is hacked.
Zero knowledge authentication allows server to authenticate user without knowing the user’s password. In
this research, this scheme was implemented with Guillou-Quisquater protocol. Two login mechanisms
were used: file-based certificate with key and local storage. Testing phase was carried out based on the
Open Web Application Security Project (OWASP) penetration testing scheme. Furthermore, penetration
testing was also performed by an expert based on Acunetix report. Three potential vulnerabilities were
found and risk estimation was calculated. According to OWASP risk rating, these vulnerabilities were at the
medium level.
New Blind Muti-signature Schemes based on ECDLP IJECEIAES
In various types of electronic transactions, including election systems and digital cash schemes, user anonymity and authentication are always required. Blind signatures are considered the most important solutions to meeting these requirements. Many studies have focused on blind signature schemes; however, most of the studied schemes are single blind signature schemes. Although blind multi-signature schemes are available, few studies have focused on these schemes. In this article, blind multi-signature schemes are proposed based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). The proposed schemes are based on the GOST R34.10-2012 digital signature standard and the EC-Schnorr digital signature scheme, and they satisfy blind multi-signature security requirements and have better computational performance than previously proposed schemes. The proposed schemes can be applied in election systems and digital cash schemes.
CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...IJCNCJournal
In network security, digital signatures are considered a basic component to developing digital
authentication systems. These systems secure Internet transactions such as e-commerce, e-government, ebanking, and so on. Many digital signature schemes have been researched and published for this purpose.
In this paper, we propose two new types of collective signature schemes, namely i) the collective signature
for several signing groups and ii) the collective signature for several individual signings and several
signing groups. And then we used two difficult problems factoring and discrete logarithm to construct these
schemes. To create a combination of these two difficult problems we use the prime module p with a special
structure: p = 2n +1. Schnorr's digital signature scheme is used to construct related basic schemes such as
the single signature scheme, the collective signature scheme, and the group signature scheme. The
proposed collective signature schemes are built from these basic schemes. The proposed signature scheme
is easy to deploy on existing PKI systems. It can support PKIs in generating and providing a unique public
key, a unique digital signature, and a unique digital certificate for a collective of many members. This is
essential for many collective transactions on today's Internet.
Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...IJCNCJournal
In network security, digital signatures are considered a basic component to developing digital authentication systems. These systems secure Internet transactions such as e-commerce, e-government, ebanking, and so on. Many digital signature schemes have been researched and published for this purpose. In this paper, we propose two new types of collective signature schemes, namely i) the collective signature for several signing groups and ii) the collective signature for several individual signings and several signing groups. And then we used two difficult problems factoring and discrete logarithm to construct these schemes. To create a combination of these two difficult problems we use the prime module p with a special structure: p = 2n +1. Schnorr's digital signature scheme is used to construct related basic schemes such as the single signature scheme, the collective signature scheme, and the group signature scheme. The proposed collective signature schemes are built from these basic schemes. The proposed signature scheme is easy to deploy on existing PKI systems. It can support PKIs in generating and providing a unique public key, a unique digital signature, and a unique digital certificate for a collective of many members. This is essential for many collective transactions on today's Internet.
Generation of Anonymous Signature and Message using Identity Based Group Blin...IDES Editor
The essential functionality of any digital
transaction system is the protection of the anonymity of user
and the message. Group signature allows any valid group
member to sign any number of messages on behalf of the
group without revealing the member identity. A blind signature
is a cryptographic scheme produces a signature, where the
digital signature is obtained on a message from a signer
without revealing any information about the message. In this
paper we bring in a new cryptographic scheme called a Group
Blind Digital Signature combines the existing concept of a
Group Digital Signature and a Blind Digital Signature. This
scheme is useful in many applications where anonymity is
very important like evoting and ecash. This blind group
signature scheme uses the identity based signature in which
the public key can be derived from any arbitrary unique string.
This reduces the complexity involved in certificate
management as compared to the traditional public key
signature scheme. Moreover, this signature scheme based on
the bilinear pairings enables utilizing smaller key sizes
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear PairingsCSCJournals
Abstract In a multi-proxy signature scheme, an original signer delegates his signing power to a group of proxy signers. Then the group of proxy signers cooperatively generates a multi-proxy signature on behalf of the original signer; and any one can verify the validity of the multi-proxy signature. But, when the signed message is sensitive to the signature receiver, it is necessary to combine the concepts of multi-proxy signatures with directed signatures. In this paper, we propose an identity based directed multi-proxy signature scheme using bilinear pairings. This scheme allows a group of proxy signers to generate a valid multi-proxy signature to a designated verifier. The designated verifier can only directly verify the multi-proxy signature generated by a group of proxy signers issued to him on behalf of the original signer and, in case of trouble or if necessary, he can convince any third party about the validity of the signatures. Finally, we discuss the correctness and security analysis of the proposed scheme.
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATUREijp2p
This article presents a new signcryption scheme which is based on the Schnorr digital signature
algorithm. The new scheme represents my personal contribution to signcryption area. I have been
implemented the algorithm in a program and here are provided the steps of the algorithm, the results and
some examples. The paper also contains the presentation of the original Signcryption scheme, based on
ElGamal digital signature and discusses the practical applications of Signcryption in real life.
The techniques of proxy signature and fault tolerance are two important issues in modern
communication.Proxy signature scheme permits an original signer to delegate his/her signing capability to a
proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. To
communicate securelyover an unreliable public network, the two parties must be able to authenticate one
another and agree on a secret encryption key. Authenticated key agreement protocols have an important role in
building a secure communications network between the two parties. In this paper, we propose a secure proxy
signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based
on the discrete logarithm problem.The scheme does not require any extra mechanism, such as checkpoints, to
achieve the property of fault tolerance.
Cost effective authentic and anonymousnexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COLLECTIVE SIGNATURE PROTOCOLS FOR SIGNING GROUPS BASED ON PROBLEM OF FINDING...IJNSA Journal
Generally, digital signature algorithms are based on a single difficult computational problem like prime factorization problem, discrete logarithm problem, elliptic curve problem. There are also many other algorithms which are based on the hybrid combination of prime factorization problem and discrete logarithm problem. Both are true for different types of digital signatures like single digital signature, group digital signature, collective digital signature etc. In this paper we propose collective signature protocols for signing groups based on difficulty of problem of finding roots modulo large prime number. The proposed collective signatures protocols have significant merits one of which is connected with possibility of their practical using on the base of the existing public key infrastructures.
Blind multi-signature scheme based on factoring and discrete logarithm problemTELKOMNIKA JOURNAL
One of the important objectives of information security systems is providing authentication of
the electronic documents and messages. In that, blind signature schemes are an important solution to
protect the privacy of users in security electronic transactions by highlighting the anonymity of participating
parties. Many studies have focused on blind signature schemes, however, most of the studied schemes
are based on single computationally difficult problem. Also, digital signature schemes from two difficult
problems were proposed but the fact is that only finding solution to single hard problem then these digital
signature schemes are breakable. In this paper, we propose a new signature schemes base on
the combination of the RSA and Schnorr signature schemes which are based on two hard problems: IFP
and DLP. Then expanding to propose a single blind signature scheme, a blind multi-signature scheme,
which are based on new baseline schemes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONIJNSA Journal
Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security. The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication. The multiple encryption technique provides sufficient security for electronic transactions over wireless network. In this research paper, the needs of multiple encryption technique in Secure Electronic Transaction are proposed to enhance the security of confidential data. This technique increases the data security in such a manner that unauthorized user can not access any part of information over wireless network as internet.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Similar to AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC (20)
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
1. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
DOI:10.5121/ijcis.2015.5402 15
AN EFFICIENT AND SECURE DIGITAL MULTI-
SIGNATURE PROTOCOL BASED ON ECC
D. Sudha Devi1
, K. Thilagavathy2
and Preethi Sai Krishnan3
1,3
Department of Computing, Coimbatore Institute of Technology, Coimbatore, India
2
Department of Physics, Coimbatore Institute of Technology, Coimbatore, India
ABSTRACT
Digital Signatures play a crucial role today as it ensures authentication, integrity and non-repudiation of a
digital message. Many researches are ongoing based on elliptic curve cryptography due to its significant
high performance. In this paper we propose an efficient and secure digital multi-signature protocol based
on elliptic curve cryptography. The proposed protocol is efficient with reduced time complexity as
compared to Chen et al.[14], Sahu and Sharma [18] and Chande and Thakur’s [20] digital multi-signature
schemes. Also the proposed protocol overcomes the insider attack as specified by Liu et al. [19] in the
Chen et.al’s digital multi-signature scheme.
KEYWORDS
Authentication, Digital Multi-Signature, Elliptic Curve Cryptography, Elliptic Curve Discrete Logarithm
Problem, Group signature, Hash function
1. INTRODUCTION
Digital Signature is a mathematical scheme which is meant for ensuring the properties such as
authentication, integrity and non-repudiation of a digital message. Authenticity ensures that the
signer is not impersonated; integrity ensures that the received message is not altered and non-
repudiation ensures that the signer cannot deny the authenticity of the signature. Digital signatures
are seem to be equivalent to handwritten signatures and are difficult to forge.
In the digital signature schemes proposed by Rivest et al. [1], Elgamal [2] and Sahmir [3], a
single person generates a signature and anyone can verify the validity of the signature. Koblitz
[4] and Miller [5] proposed Elliptic Curve Discrete Logarithm Problem (ECDLP) independently
as a new cryptographic scheme which plays a significant role in cryptographic techniques. In
Johnson et al. [6] it is revealed that Vanstone proposed Elliptic Curve Digital Signature
Algorithm (ECDSA) in 1992, in response to National Institute for Standards and Technology [7]
and was accepted in 1998 as an International Standards Organization (ISO 14888-3) standard [8],
as an American National Standards Institute (ANSI X9.62) standard [9] in 1999 and as Institute
of Electrical and Electronics Engineers (IEEE - I363-2000) standard [10] and NIST’s FIPS (FIPS
186-2) standard [11] in 2000. In 2000, Nyang and Song [12] explicated a verification protocol for
smart card which was based on zero-knowledge proof.
Generally the signer of a message is a single person who formulates a signature with the private
key that can be verified by a verifier using the corresponding public key. But there are cases in
which multiple persons acts as signer and is referred as a multi-signature scheme. A multi-
signature can be effectively generated with the cooperation of all persons in the group and can be
2. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
16
verified by a verifier using the group public-key. Initially Itakura and Nakamura [13] proposed a
public key cryptosystem for digital multi-signatures. Many other Digital multi-signature schemes
were proposed by Chen et al. [14], Harn and Ren [15] and Yang et al. [16] using elliptic curve
cryptosystem and RSA algorithm. Domıguez and Encinas [17] offered Java implementation for
RSA based multi-signature scheme. Sahu and Sharma [18] proposed a multi-signature scheme
based on Elliptic Curve Crypto system. Chande and Thakur [20] proposed a Multi-Signature
scheme based on ECC for the wireless Network. Amir et. al [21] proposed a Digital Signature
Scheme using hash function and discrete logarithm.
The rest of the paper is organized as follows. Section 2 deals with the proposed Digital Multi-
Signature protocol. Security and Performance analysis of the proposed protocol is discussed in
section 3 and section 4 concludes this paper. Section 5 discusses on the future work.
2. PROPOSED DIGITAL MULTI-SIGNATURE PROTOCOL
The working of a Digital Signature scheme is depicted in Figure 1. The signer generates a
message digest using a hash function and encrypts the digest with his private key. The document
and the signature are sent and the verifier calculates the message digest using the hash function.
The received signature is decrypted with the signer’s public key. The calculated digest is
compared with the decrypted signature and if the condition satisfies, the verifier validates the
signature else rejects the signature.
Figure 1. Overview of Digital Signature
The Digital Multi-Signature protocol proposed in this paper can be effectively used where a group
of members need to sign a document for approval after doing some modifications in the
document. For example users in a hierarchy, belonging to a security class has write permission on
a file. After manipulating the file, all the users in that security class should sign the file which
could be verified by the data owner for further processing of the file. In such case, utilizing a
3. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
17
digital multi-signature scheme is mandatory to ensure authenticity, integrity and non-repudiation
properties of the digital document.
In this paper, we propose an efficient and secure Digital Multi-Signature protocol which consists
of a Setup phase, Key generation phase, Multi-Signature generation phase and Multi-Signature
verification phase as follows:
2.1. SETUP PHASE
1. A field size q which defines the finite field ,where q = p, if p is an odd prime or
where q is a prime power.
2. Let a, b be two parameters of elliptic curve which defines the equation
.
3. A finite point on elliptic curve having largest order n is chosen as a base point P.
2.2. KEY GENERATION PHASE
Let be the members of a group. Each member of the group generates the keys
as follows:
1. Select a random integer from the interval [1,n-1], which is the private key.
2. Compute the public key as .
3. Send the computed to the other member of the group and the group admin completes
the task by summing up all as follows:
2.3. MULTI-SIGNATURE GENERATION PHASE
Each member of the group generates the multi-signature as follows:
1. Select a random integer from the interval [1,n-1].
2. Compute .
3. Send to the other member of the group and finally the group admin sums up all as
follows:
4. Using one-way hash function the message m is converted into an integer e as,
e=h(m)
5. Compute
6. Send to the other member of the group and the group admin determines ‘s’ as follows:
7. Send (s,Y) to the verifier.
4. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
18
2.4. MULTI-SIGNATURE VERIFICATION PHASE
The verifier receives (s,Y) and validates as follows:
1. Computes one-way hash function with the received message to get the digest as follows:
e=h(m)
2. Computes v1 = sP
3. Computes v2 = Y + eX
4. The verifier validates the signature if v1 = v2 else reject it.
2.5. PROOF:
The consistency of the proposed Digital Multi-Signature is ensured as follows:
v1 = sP
= ( si
N
i 1 mod n)P
= ( ki)P e( di
N
i 1 )PN
i 1
= ( i) e( i
N
i 1 )N
i 1
= Y + e X
=v2
The proof shows that the digital signature is validated smoothly.
3. DISCUSSION ON SECURITY AND PERFORMANCE ANALYSIS
3.1 SECURITY ANALYSIS
Attack 1:
If an adversary tries to derive the private key di from i, then he has to solve Elliptic Curve
Discrete Logarithm Problem (ECDLP). That is, the adversary cannot derive di from diP which is
the strength of elliptic curve cryptosystem.
Attack 2:
An adversary tries to forge the signature (s,Y) for a message m as (z+s,Y). To forge the valid
signature, he selects a number randomly and appropriately for z but could not evaluate and prove
that (z+k+ed)P equals Y+eX. Hence forged message results in failure.
Attack 3:
If an adversary tries to forge the signature with the verification equation v1=sP, then again he has
to solve Elliptic Curve Discrete Logarithm Problem since the strength of the verification equation
relies on the strength of elliptic curve cryptosystem.
Attack 4:
In Chen et al’s scheme, since the key generation and signature generation is done by the same
signer say n who is the last signer in the multi-signature scheme. Liu et.al [19] proves that this
scheme is vulnerable to insider attack. That is, the signer n could sign a legal signature which
other signers have signed and forge a signature himself which could be accepted by the verifier.
5. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
19
In the proposed scheme since the last signer is usually the trusted group admin who is going to
monitor every signer in the group, the above stated attack can be avoided.
The group admin, if suspected can randomly check and ensure whether a signer in the group has
signed the message. If a signer n tries to forge a signature himself as N - i
N
i 1 and sends
nto group admin, then it can be identified by the group admin as follows:
Let s be a signer in the group and if the group admin wants to audit whether this signer has
signed the document, then the group admin evaluates the following formula to verify it.
sP- - s -e
= ( si
N
i 1 mod n)P - ( - s)-e
= [( ki)P e di
N
i 1 )P]N
i 1 ( i- s) e i
N
i 1 )N
i 1 = s
If the group admin does not get the audited signer’s public key as a result of the evaluation, then
it is ensured that either the audited signer has not signed the document or the signature is forged.
Since this evaluation can be done for all the signers in the group randomly at each time, the
insider attack as specified by Liu et al. is overcome in the proposed protocol.
3.2 PERFORMANCE ANALYSIS
The proposed protocol is compared with the signature schemes proposed by Nyang and Song,
Chen et al., Sahu and Sharma, and Chande and Thakur’s schemes. Table 1 depicts the notations
and its description used for performance analysis. Table 2 represents the computational time of
various operations.
Table 1.Notations and its Description.
Notation Description
Time complexity for executing a number and elliptic curve point
multiplication
Time complexity for executing addition of two points in an elliptic curve
Time complexity for executing subtraction of two points in an elliptic curve
Time complexity for executing modular exponentiation
Time complexity for executing modular multiplication
Time complexity for executing modular addition
Time complexity for executing modular inversion
Time complexity for executing hash function
Table 2. Various operation units converted into Tmul.
Table 3 shows the comparison between various digital multi-signature schemes and the proposed
protocol on the basis of time complexity. From Table 3, it is revealed that the time complexity of
the proposed digital multi-signature protocol is comparatively less than other signature schemes
thereby proves the high efficiency of the signature generation and verification of the proposed
protocol.
6. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
20
Table 3.Comparison of various Digital Multi-Signature schemes.
Schemes Multi-Signature generation Phase Multi-Signature verification Phase
Time complexity Complexity in
terms of
Time
complexity
Complexity in terms
of
Nyang and
Song [12]
Chen et al.
[14]
Sahu and
Sharma
[18]
Chande
and Thakur
[20]
Proposed
protocol
4. CONCLUSIONS
Elliptic Curve Cryptography is one of the most promising methods in the public key cryptography
field. It provides many advantages over other cryptographic methods. The proposed digital multi-
signature protocol is constructed based on the strength of elliptic curve discrete logarithm
problem. The proposed protocol overcomes the attack as specified by Liu et al. in the Chen et
al.’s digital multi-signature scheme. Also the performance analysis proves that the proposed
protocol is efficient with reduced time complexity compared to other digital multi-signature
schemes.
5. FUTURE WORK
The extension of Digital signature is the Digital Multi-Signature in which more than one signer
participates in signing a document. The proposed Digital Multi-Signature protocol is designed for
a group of signers to sign the whole document cooperatively. There are circumstances, where
these signers are expected to sign a particular section of a document rather than signing the whole
document. There are many solutions available for this kind of Multi-Signature scheme with
distinguished signing authorities. But an improved Elliptic Curve Based Multi-Signature scheme
with distinguished signing authoritieswith reduced time complexity is required and has to be
implemented in future which should yield better results than the existing Signature schemes.
REFERENCES
[1] R.L. Rivest, A. Shamir, and L. Adleman, (1978) “A method for obtaining digital signatures and
public-key cryptosystems”, Communications of the ACM, vol. 21, no. 2, pp. 120–126.
[2] T. Elgamal, (1985) “A public key cryptosystem and a signature scheme based on discrete logarithms,”
IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472.
[3] A. Shamir, (1985) “Identity-based cryptosystems and signature schemes”, Advances in Cryptology -
CR PTO’84, LNCS 196,Springer-Verlag, pp. 47–53.
7. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
21
[4] N. Koblitz, (1987) “Elliptic Curve Cryptosystem”, Mathematics of Computation, vol. 48, no. 177, pp
203-209.
[5] Victor S. Miller, (1986)“ se of Elliptic Curves in Cryptography”, Advances in Cryptology –
CR PTO’85, LNCS 218, Springer-Verlag,pp. 417-426.
[6] D. Johnson, A. Menezes, S. Vanstone, (2001) “The Elliptic Curve Digital Signature Algorithm
(ECDSA), International Journal of Information Security, vol.1, pp. 36-63.
[7] S. Vanstone, (1992)“Responses to NISTs Proposal”, Communications of the ACM, vol. 35, pp. 50-
52.
[8] ISO/IEC 14888-3,(1998) “Information technology – securitytechniques – digital signatures with
appendix. Part 3: Certificatebased-mechanisms”, International Organization forStandardization,
Geneva.
[9] ANSI 9.62,(1999) “Public key cryptography for the financial services industry: the elliptic curve
digital signature algorithm (ECDSA)”.
[10] IEEE P1363, (1999) “Standard specifications for public-key cryptography”, Draft Version 13,
November-12.
[11] National Institute for Standards and Technology, (2000)“Digital Signature Standard (DSS)”, FIPS
Pub.186-2.
[12] D. Nyang and J. Song, (2000)“Knowledge-proof based versatile card verification protocol”,
Computer Communication Review, ACM SIGCOM, vol. 30, pp. 39-44.
[13] K. Itakura and K. Nakamura, (1983)“A public key cryptosystem suitable for digital multisignatures”,
NEC Research and Development, vol. 71, pp. 1-8.
[14] T. S. Chen, K. H. Huang, and . F. Chung, (2004)“Digital multi-signature scheme based on the
elliptic curve cryptosystem,” Journal of Computer Science and Technology, vol. 19, no. 4, pp. 570.
[15] L. Harn and J. Ren, (2008) “Efficient identity-based RSA multisignatures”, Computers & Security,
vol. 27, pp. 12–15.
[16] F. . ang, J.H. Lo, and C.M. Liao, (2010) “Improvement of an Efficient ID-Based RSA
Multisignature,” International Conference on Complex, Intelligent and Software Intensive Systems
(CISIS), pp. 822–826.
[17] F. J. B.Domıguez, L. H.Encinas, (2011) “Digital identity-based multisignature scheme
implementation”, INFOCOMP 2011 : The First International Conference on Advanced
Communications and Computation.
[18] H. Sahu and B. K. Sharma, (2011) “An MSS Based on the Elliptic Curve Cryptosystem”,
International Journal of Network Security, Vol.12, no.1, pp. 1–3.
[19] D. Liu, P. Luo, and .Q Dai, (2007) “Attack on Digital Multi-Signature Scheme Based on Elliptic
Curve Cryptosystem”, Journal of Computer Science and Technology, Vol.22, no.1, pp. 92-94.
[20] M.K.Chande and B.S.Thakur, (2014) “An Elliptic Curve Based Multi-Signature Scheme For Wireless
Network”, International Journal of Information & Network Security, Vol.3, no.1, pp. 33-39.
[21] M. Amir, J. Ahmed, S. Bansal, A. K. Garg, and M. Singh, (2014) “Digital Signature Scheme sing
Two Hash Functions”, International Journal of Science and Research, Vol.3, no.4, pp. 126-128.
AUTHORS
Sudha Devi is currently working as Assistant Professor in the Department of Computing,
Coimbatore Institute of Technology, Coimbatore, India and is a Ph.D. scholar in Anna
University of Technology, Chennai, India. Her research focuses on Cryptography and
Network Security, Security in Cloud Computing.
Dr.K.Thilagavathy is currently working as Associate Professor in the Department of
Physics, Coimbatore Institute of Technology, Coimbatore, India. She is handling classes
for B.E/B.Tech students since 1992. She obtained her doctoral degree from
Avinashilingam University for Women, Coimbatore in 2009. Currently she is involved in
image processing and Information security projects.
Preethi Sai Krishnan is currently pursuing MSc. Software Engineering at Coimbatore
Institute of Technology. Her area of interest are information security and problem solving
techniques. Other interest includes working on parallel programming and algorithms.