TITLE

Algorithm for creating a digital signature with error detection and correction

AUTHOR(S)
Biyashev, R.; Nyssanbayeva, S.
PUB. DATE
July 2012
SOURCE
Cybernetics & Systems Analysis;Jul2012, Vol. 48 Issue 4, p489
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This paper proposes an algorithm that creates a digital signature in a nonpositional polynomial notation and forms three surplus residues modulo one extension polynomial base number. Such a signature allows for single-error detection and correction (which is shown to be a unique procedure) and multiple error detection. A formula of cryptographic security is obtained for such a digital signature.
ACCESSION #
79824067

 

Related Articles

  • Confined Guessing: New Signatures From Standard Assumptions. Böhl, Florian; Hofheinz, Dennis; Jager, Tibor; Koch, Jessica; Striecks, Christoph // Journal of Cryptology;Winter2015, Vol. 28 Issue 1, p176 

    We put forward a new technique to construct very efficient and compact signature schemes. Our technique combines several instances of only a mildly secure signature scheme to obtain a fully secure scheme. Since the mild security notion we require is much easier to achieve than full security, we...

  • A New Digital Signature Scheme Based on Two Hard Problems. Verma, Swati; Sharma, Birendra Kumar // International Journal of Pure & Applied Sciences & Technology;Aug2011, Vol. 5 Issue 2, p55 

    In this paper, we propose a new signature scheme based on factoring and discrete logarithm. This scheme is based on two hard problems and provides higher level security as compare to a single hard problem. Most of the designated signature schemes are based on a single hard problem. Although...

  • EIPS: An Efficient Identity-based Ring Signature Scheme. ZHANG Jian Hong; WANG Wei; ZHEN Wei Na; DONG Qiao Cui // Applied Mechanics & Materials;2014, Vol. 687-691, p2100 

    As an important crypto graphical tool, ring signature is able to realize full anonymity and identity protection. Comparison the traditional PKI, Identity-based (ID-based) cryptography is a very good cryptosystem since it eliminates the need for checking the validity of the certificates of...

  • Elliptic Curve Digital Signature Algorithm.  // Network Dictionary;2007, p174 

    An encyclopedia entry for the "Elliptic Curve Digital Signature Algorithm" (ECDSA) is presented. It refers to a standard that is the elliptic curve cryptography analog of the Digital Signature Algorithm. ECDSA was accepted as an American National Standards Institute (ANSI) standard in 1991, and...

  • Implementing the RSA cryptosystem with Maxima CAS. Monterde, Juan; Vallejo, José A. // Electronic Journal of Mathematics & Technology;Feb2012, Vol. 6 Issue 1, p34 

    We show a possible implementation of the RSA algorithm with Maxima CAS. Theoretical background and numerous examples are given, along with the code. We also implement a simplified version of the digital signature method and comment on some ideas for using this material in the classroom.

  • Signature Identification Scheme Based on Iterated Function Systems. AL-Saidi, Nadia M. G. // World Academy of Science, Engineering & Technology;Aug2011, Issue 56, p412 

    Since 1984 many schemes have been proposed for digital signature protocol, among them those that based on discrete log and factorizations. However a new identification scheme based on iterated function (IFS) systems are proposed and proved to be more efficient. In this study the proposed...

  • SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES. Atanasiu, Adrian; Savu, Laura // Journal of Information Systems & Operations Management;May2012, Vol. 6 Issue 1, p19 

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the...

  • A Secured Message Transaction Approach by Dynamic Hill Cipher Generation and Digest Concatenation. Chowdhury, Md. Saiful Islam; Shohag, Shoyeb Al Mamun; Sahid, Md. Hasan // International Journal of Computer Applications;Jun2011, Vol. 23, p25 

    An electronic transaction system is a set of participants and their interactions towards an efficient and secured exchange of message between the participants. A secured electronic message transaction system has been designed, developed and implemented where Hill Cipher Cryptosystem is used as...

  • New Algorithm to Reduce File Size and Bandwidth of Hashed Digital Signature for Image Steganography using LSB. Noroozi, Erfaneh; Daud, Salwani Mohd; Sabouhi, Ali; Salehnamadi, MohammadReza // Advanced Materials Research;2014, Vol. 980, p194 

    In computer cryptography, digital signature is one of the best cryptography systems. Public-private keys are used to pass sensitive information however it can also be used to provide authentication on the particulars of a sender. Proposed algorithm is a new design and simple implementation...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sign out of this library

Other Topics