Message recovery signature scheme using complementary elliptic curves

被引:0
|
作者
Yew, TC [1 ]
Haili, HK [1 ]
Sumari, P [1 ]
机构
[1] Univ Sci Malaysia, Sch Math Sci, George Town, Malaysia
关键词
elliptic curve cryptosystems; isomorphic curves; complementary curves; imbedding plaintexts; message recovery; signature scheme;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Elliptic curve cryptography is known for its complexity due to its discrete logarithm problem, and this gives advantage to the system used since the formula developed using this concept is hard to break, therefore this criteria has given mathematicians a courage to explore this area of research. Earlier in [10], we have showed a new method for imbedding plaintexts using complementary elliptic curve and now in this paper we will extend our work to obtain a new modified method for Nyberg-Rueppel message recovery signature scheme using complementary curve. By applying this method, we will eventually enlarge the block of message of elliptic curve cryptosystems and this resulted in faster communication and processing time and at the same time the security level remain tight.
引用
收藏
页码:106 / 110
页数:5
相关论文
共 50 条
  • [1] NEW SIGNATURE SCHEME WITH MESSAGE RECOVERY
    PIVETEAU, JM
    [J]. ELECTRONICS LETTERS, 1993, 29 (25) : 2185 - 2185
  • [2] A Timestamped Signature Scheme with Message Recovery
    Mohanty, Sujata
    Kumar, Pothuri Bhanu Sai Pavan
    Hanok, Kodavatikanti
    [J]. 2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [3] Quantum signature scheme with message recovery
    Wang, J
    Zhang, Q
    Tang, CJ
    [J]. 8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1375 - U1378
  • [4] Signature scheme with message recovery and its application
    Sekhar, MR
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2004, 81 (03) : 285 - 289
  • [5] NEW SIGNATURE SCHEME WITH MESSAGE RECOVERY - REPLY
    PIVETEAU, JM
    [J]. ELECTRONICS LETTERS, 1994, 30 (11) : 852 - 852
  • [6] Forgery attack on a signature scheme with message recovery
    Yu, Baozheng
    Xu, Congwei
    [J]. 2006 ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2006, : 904 - +
  • [7] Arbitrated quantum signature scheme with message recovery
    Lee, H
    Hong, CH
    Kim, H
    Lim, J
    Yang, HJ
    [J]. PHYSICS LETTERS A, 2004, 321 (5-6) : 295 - 300
  • [8] ELLIPTIC CURVES DIFFERENTIATION WITH APPLICATION TO GROUP SIGNATURE SCHEME
    Golumbeanu, Alin Ionut
    Ticleanu, Oana Adriana
    [J]. ELECTRONIC JOURNAL OF DIFFERENTIAL EQUATIONS, 2017,
  • [9] Designated verifier proxy signature scheme with message recovery
    Lu, RX
    Cao, ZF
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1237 - 1246
  • [10] A signature scheme with message recovery as secure as discrete logarithm
    Abe, M
    Okamoto, T
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 378 - 389