• No results found

public-key digital signature

Discrete cosine transformation, Elliptic curve digital signature algorithm, Image authentication, imperceptibility, JPEG, Public key cryptography.

Discrete cosine transformation, Elliptic curve digital signature algorithm, Image authentication, imperceptibility, JPEG, Public key cryptography.

... In this paper we propose a new semi-fragile watermarking approach which can be use to authenticate visual content of the images. New technique is effective, as it reaches all above define requirements. More precisely ...

6

Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys

Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys

... that their attack cannot work. In the same year, Shao [9] presented an insider forgery attack to Tseng and his colleagues authenticated encryption scheme, and showed that their scheme cannot resist this attack. He also ...

13

Enhanced Secured Wireless Message Communication using Digital Signature Algorithm (DSA)

Enhanced Secured Wireless Message Communication using Digital Signature Algorithm (DSA)

... symmetric key and asymmetric key cryptographic algorithms. In Symmetric Key Algorithm, a single key is used to encrypt and decrypt the data while, Asymmetric Key Algorithm uses two ...

10

Comparison of e-Voting Schemes: Estonian and Norwegian Solutions

Comparison of e-Voting Schemes: Estonian and Norwegian Solutions

... In figure 1, the core architecture of Estonian e-voting system is shown. A detail description of the voting system can be found at [2]. In brief, the whole procedure is like this, The voter goes to the voting website and ...

7

Signed metadata: method and application

Signed metadata: method and application

... a public-key infrastructure (PKI) is discussed for digital signature of metadata records, providing evidence of the identity of the signer and the authenticity of the information within the ...

5

A Proposed Model for Data Privacy providing Legal Protection by E-Court

A Proposed Model for Data Privacy providing Legal Protection by E-Court

... c) Organization: An entity which has its own Digital signature and public key for each certificate of e-Contract as its unique identifiers. Functions as an intermediary to provide data [r] ...

9

On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key

On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key

... Self-certified public keys are proposed to eliminate the burden of verifying the public key before ...new digital signature schemes, no redundancy is needed to be embedded in the signed ...

14

An Efficient Blind Digital Signature Protocol Based on Elliptic Curve

An Efficient Blind Digital Signature Protocol Based on Elliptic Curve

... private key to decrypt the ...private key to encrypt his messages to send out, and a public key used by the receiver to decrypt his sent-out ...called Digital Signature. A ...

14

A Digital Signature Scheme Based on Pell Equation

A Digital Signature Scheme Based on Pell Equation

... a public key cryptosystem and a digital signature scheme based on the difficulty of solving the Discrete Logarithm Problem in the multiplicative group of an appropriate finite ...the ...

5

Introduction to Cryptography   Principles & Applications, 2nd Ed  pdf

Introduction to Cryptography Principles & Applications, 2nd Ed pdf

... of public- key cryptography in their famous paper “New Directions in Cryptography” ...a public-key method for key agreement which is in use to this ...how digital signatures ...

372

Enhanced security for data transaction 
		with public key Schnorr authentication and digital signature protocol

Enhanced security for data transaction with public key Schnorr authentication and digital signature protocol

... the digital signature (Wang & Song, 2016) (Sravanthi & Prasad, 2011) (Shiralkar & ...A digital signature is an authentication mechanism that allows the message maker to add code ...

8

An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel

An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel

... without digital signature on an algebraic coding theory based public key cryptosystem which relay on the difficulty of decoding and proposed by McEliece, and also provide us an error less ...

5

Secure Proxy Digital Signature Scheme using Digital Signature Standard with Random Key Generation Process

Secure Proxy Digital Signature Scheme using Digital Signature Standard with Random Key Generation Process

... iv. When the original signer delegates his signing power to a proxy signer in the proxy warrant, it is included in a valid delegation period and other constrains on signing capability. Delegation period is the time ...

6

What security and assurance standards does Trustis use for TMDCS certificate services?

What security and assurance standards does Trustis use for TMDCS certificate services?

... self-signed digital certificate of the Root Certificate Authority – the Certificate Authority that provides the Trust Anchor in a Public Key ...The public key in this root certificate ...

5

IMPROVED APPROACH FOR INTRANET MAILING IN PRETTY GOOD PRIVACY (PGP)

IMPROVED APPROACH FOR INTRANET MAILING IN PRETTY GOOD PRIVACY (PGP)

... session key is allowed to be encrypted by using receiver’s public key and server let to forward only hash of the message rather than the ...send Digital Signature that assures proof of ...

6

Survey of One Time Signature Schemes on Cloud Computing

Survey of One Time Signature Schemes on Cloud Computing

... or public information. The conventional signature schemes like RSA, the same key pair can be used to authenticate large number of ...new key pairs for each message. Simple digital ...

5

EdDSA Over Galois Field GF(p^m) for Multimedia Data

EdDSA Over Galois Field GF(p^m) for Multimedia Data

... Edwards-curve Digital Signature Algorithm (EdDSA) was proposed to perform fast public-key digital signatures and thus replace the Elliptic-Curve Digital Signature ...Its ...

7

Secure  Comparator:  a  ZKP-Based  Authentication  System

Secure Comparator: a ZKP-Based Authentication System

... For digital signature usage, it does not create serious threat - the second operation is used only to verify signatures with the public key (no secret information is ...

8

Misplaced Priorities: The Utah Digital Signature Act and Liability Allocation in a Public Key Infrastructure

Misplaced Priorities: The Utah Digital Signature Act and Liability Allocation in a Public Key Infrastructure

... However, customers are strictly liable for other types of telecommunications fraud, as discussed in Part V(C), infra, and the RBOCs bear virtually no risk of loss fo[r] ...

52

Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm

Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm

... Digital signature plays an important role in online ...the digital signature only. Digital signature is a branch of cryptography [2, 15, ...symmetric key algorithms, ...

5

Show all 10000 documents...

Related subjects