oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Combining Public Key Encryption with Schnorr Digital Signature  [PDF]
Laura Savu
Journal of Software Engineering and Applications (JSEA) , 2012, DOI: 10.4236/jsea.2012.52016
Abstract: This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life. The purpose of the study is to combine the public key encryption with Schnorr digital signature in order to obtain less computational and communicational costs. Signcryption primitive is a better approach then Encrypt-then-Sign or Sign-then-Encrypt methods regarding the costs. All these algorithms offer the possibility to transmit a message over an insecure channel providing both authenticity and confidentiality.
Digital multi-signature scheme based on Schnorr signature
基于Schnorr体制的多重数字签名 

LI Wei-ke,LI Fang-wei,
李维科
,李方伟

重庆邮电大学学报(自然科学版) , 2005,
Abstract: 基于Schnorr签名体制提出了一种多重数字签名方案,方案的安全性等价于Schnorr签名体制。方案具有可验证性,且签名的长度不随签名者的人数线性增长,并能抵抗各种内部合谋攻击,具有更高的实用性和安全性。
Analysis of Some Attacks against the Schnorr Signature Scheme
对Schnorr签名方案几种攻击的分析

HU Guo-zheng,HONG Fan,
胡国政
,洪帆

计算机科学 , 2009,
Abstract: The Schnorr signature scheme is a digital signature scheme based on discrete logarithms.Recently some attacks against the Schnorr signature scheme were presented in the literature and they claimed that these new attacks had the greater success probability.However,these attacks were analyzed and the conclusion is that all these new attacks are essentially trivial exhaust search ones.Given certain system security parameters,the success probability of theses attacks is negligible.Moreover,some mistakes in the ...
Schnorr signature-based privacy protection online ordering scheme
基于Schnorr签名的隐私保护网上订购方案

SHEN Yan-guang,LIN Xiang-long,
申艳光
,林祥龙

计算机应用研究 , 2013,
Abstract: The privacy of users must be protected in e-commerce According to the theory of oblivious transfer, this paper proposed an online order of digital products scheme which could effectively protect the user' privacy through OSBE based on Schnorr signature. First, the user paid the bank correctly and anonymously, and got the digital signature of the product he would order. Then the user interacted with the merchant obliviously through electronic signature, the user could only get the product he ordered. The example shows that the scheme can effectively protect the user's privacy information and prevent the merchant malicious fraud.
Cryptanalysis of Schnorr Signature Scheme
Schnorr签名方案的一种攻击

LIU Jing-Mei,WANG Xin-Mei,
刘景美
,王新梅

计算机科学 , 2006,
Abstract: Schnorr signature is widely used in smart card with little computation and high rate, so it should be enough secure. In this paper a method is presented to forge the signature of Schnorr signature scheme,and we also present a key-recovery attack against the Schnorr signature algorithm under the chosen messages. All the attack actions do not depend on the computation of discrete logarithm.
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme  [cached]
Mohsen Toorani,Ali Asghar Beheshti Shirazi
International Journal of Network Security , 2010,
Abstract: The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although several signcryption schemes are proposed over the years, some of them are proved to have security problems. In this paper, the security of Han et al.'s signcryption scheme is analyzed, and it is proved that it has many security flaws and shortcomings. Several devastating attacks are also introduced to the mentioned scheme whereby it fails all the desired and essential security attributes of a signcryption scheme.
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme  [PDF]
M. Toorani,A. A. Beheshti
Computer Science , 2010,
Abstract: The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although several signcryption schemes are proposed over the years, some of them are proved to have security problems. In this paper, the security of Han et al.'s signcryption scheme is analyzed, and it is proved that it has many security flaws and shortcomings. Several devastating attacks are also introduced to the mentioned scheme whereby it fails all the desired and essential security attributes of a signcryption scheme.
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve  [PDF]
M. Toorani,A. A. Beheshti
Computer Science , 2010, DOI: 10.1109/ICCEE.2008.147
Abstract: The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having its own problems and limitations. In this paper, the security of a recent signcryption scheme, i.e. Hwang et al.'s scheme is analyzed, and it is proved that it involves several security flaws and shortcomings. Several devastating attacks are also introduced to the mentioned scheme whereby it fails all the desired and essential security attributes of a signcryption scheme.
Performance Evaluation of Modified Signcryption Scheme  [PDF]
Bharat Gupta,Dr. Rajeev Gupta
International Journal on Computer Science and Engineering , 2012,
Abstract: Before a message is sent out, the sender of the message would sign it using a digital signature scheme and then encrypt the message (and the signature) use a private key encryption algorithm under a randomly chosen message encryption key. The random message encryption key would then be encrypted using the recipient's public key. We call this process two-step approach: “signature-then-encryption”. Concept signcryption, first proposed by Zheng, is a cryptography primitive which combines both the functions of digital signature and public key encryption in a logical single step, and with a computational cost and communication overhead are significantly lower than that needed by traditional signature then encryption. In Zheng’s scheme, the signature verification can be done recipient’s private key at receiverend and its security are based on mainly Discrete Logarithm Problem (DLP), reversing one way hash function. In proposed modified signcryption scheme, security is based on the intractability of three hard problems: Discrete Logarithm Problem, reversing one way hash function and to determine prime factors of a composit number. Proposed signcryption scheme has all the benefits of signcryption and is also able to resolve the dispute / problem of non repudiation by independent third party, without compromising with sender and recipient’s private keys.
Threshold group signcryption scheme with high security
一种高安全的门限群签密方案

FENG Jun,WANG Xue-ming,
冯 君
,汪学明

计算机应用研究 , 2013,
Abstract: In order to meet the high security of group communication, by combining hyperelliptic curve cryptosystem with Schnorr's signature schemes, this paper proposed a high security group signcryption scheme with a t, n threshold signcryption and a k, l threshold verification. This scheme improved the security defects of Peng et al. , scheme and Wang et al. , scheme. It achieved proactive secret sharing of secrets of threshold signcryption and threshold unsigncryption by Desmedt et al. , secret redistribution protocol. The new scheme can avoid the attack of the evil information and provide the capability of detecting cheating and identifying the cheater besides the property which threshold group signcryption should have. It has lower communication cost and higher security which is especially suitable for solving security problems of the network with limited resource.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.