Results 171 to 180 of about 1,761 (191)
Some of the next articles are maybe not open access.

ECDLP Based Proxy Multi-signature Scheme

2012
A Proxy signature scheme enables a proxy signer to sign a message on behalf of the original signer. In this paper, we propose efficient and secure Proxy multi-signature scheme based on elliptic curve cryptosystem. Our scheme satisfy all the proxy requirements and require only elliptic curve multiplication and elliptic curve addition which needs less ...
Ramanuj Chouksey   +2 more
openaire   +1 more source

ECDLP‐based certificateless proxy signature scheme with message recovery

Transactions on Emerging Telecommunications Technologies, 2012
AbstractCertificateless public key cryptography (PKC) eliminates the use of certificates in traditional PKC and the key escrow problem in identity‐based PKC. Up to now, a number of certificateless proxy signature (CLPS) schemes have been proposed. However, only a little attention has been paid to the construction of CLPS schemes with message recovery ...
Sahadeo Padhye, Namita Tiwari
openaire   +1 more source

A New Digital Proxy Signature Scheme Based on ECDLP

2009 International Conference on Computational Intelligence and Security, 2009
In the proxy signature scheme the proxy signer has the power to act on behalf of the original signer. In order to overcome the security threats and weaknesses in existing schemes, a new proxy signature based on elliptic curve cryptosystem (ECC) is presented.
Chengming Qi, Xusheng Chen
openaire   +1 more source

A Secure Off-Line Electronic Cash Scheme Based on ECDLP

2009 First International Workshop on Education Technology and Computer Science, 2009
The paper proposes a secure off-line electronic cash scheme based on ECDLP and gives a comprehensive analysis of its three sub protocols: withdrawal, payment, and deposit. It also proved the security of the scheme based on some cryptographic assumptions.
Zhan-gang Wang, Zhen-kai Wan
openaire   +1 more source

Quantum Attacks on ECDLP-Based Cryptosystems

2013
In this chapter we shall first study the elliptic curve discrete logarithm problem (ECDLP) and the classical solutions to ECDLP, and then we shall discuss some of the most popular ECDLP-based cryptographic systems for which there is no efficient cryptanalytic algorithm.
openaire   +1 more source

Some basic principles for proxy signature schemes based on ECDLP

Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, 2010
Nowadays, most proxy signature schemes are based on the difficulty of DLP (Discrete Logarithm Problem) or ECDLP (Elliptical Curve Discrete Logarithm Problem). As though many proxy signature schemes based on DLP or ECDLP have been proposed, it makes us discouraged that some disadvantages can be found after a new or modified proxy signature scheme was ...
Fengying Li, Qingshui Xue, Zhenfu Cao
openaire   +1 more source

A Secure Proxy Blind Signature Scheme Based on ECDLP

2009 International Conference on Multimedia Information Networking and Security, 2009
To overcome the secure weakness of the existing proxy blind signature scheme based on ECDLP, an improved scheme is presented. The security of the improved scheme is enhanced by improving on the generate form of the proxy commission and the proxy private key in the proxy phase, the procedure of blinding and unblinding, and the corresponding verification
Lanlan Hu   +3 more
openaire   +1 more source

Password guessing attack on a key exchange protocol based on ECDLP

2010 IEEE International Conference on Progress in Informatics and Computing, 2010
Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Three-party key exchange protocol is an important technique for two clients to agree a session key with the help of a trusted server who shares a human password with each client.
null Chungen Xu, null Yanjiong Yang
openaire   +1 more source

Pollard's rho attack on ECDLP and Threshold Schemes

Monte Carlo Methods and Applications, 2007
A threshold secret sharing scheme is one in which a piece of information is shared among a group of t persons such that, any k number of them for k ≤ t pool in their shares to recover the secret. In this paper, we propose a suitable technique for a (2, t)-threshold scheme that is based on a cryptanalytic attack of the Elliptic Curve Discrete Logarithm ...
openaire   +1 more source

New Digital Signature Scheme Based on both ECDLP and IFP

2009 2nd IEEE International Conference on Computer Science and Information Technology, 2009
Based on the analysis of Elliptic Curve Digital Signature Algorithm(ECDSA) and a group of digital signature schemes including two hard problems, a new digital signature scheme based on both Elliptic Curve Discrete Logarithm Problem and Integer Factoring Problem is proposed .The scheme's security is analyzed to show that only when parameter k is one-off
null Qin Yanlin, null Wu Xiaoping
openaire   +1 more source

Home - About - Disclaimer - Privacy