a public key cryptosystem and a signature scheme based on discrete logarithms pdf

A Public Key Cryptosystem And A Signature Scheme Based On Discrete Logarithms Pdf

By Jack H.
On Thursday, April 15, 2021 11:53:25 PM

File Name: a public key cryptosystem and a signature scheme based on discrete logarithms .zip
Size: 12402Kb
Published: 16.04.2021

ElGamal encryption

Authors : Chandrashekhar Meshram. Abstract: In , Shamir introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a Key Authentication Center KAC and identify him self before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key.

In this way if a user wants to communicate with others he only needs to know the identity of his communication partner and the public key of the KAC. There is no public file required in this system. However, Shamir did not succeed in constructing an identity based cryptosystem but only in constructing an identity-based signature scheme.

Meshram and Agrawal have proposed an id-based cryptosystem based on double discrete logarithm problem which uses the public key cryptosystem based on double discrete logarithm problem.

In this study, we propose the modification in an id based cryptosystem based on the double discrete logarithm problem and we consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system. Chandrashekhar Meshram , Asian Journal of Information Technology, Submit a Manuscript. Volume: Issue: 2. Page No. DOI: How to cite this article: Chandrashekhar Meshram , Design and power by Medwell Web Development Team.

A New Blind Signature Scheme Based on Improved ElGamal Signature Scheme

Browse list of volumes Submit an article. Search form. Get content alerts. No files have yet been downloaded. Facebook LinkedIn Twitter.

Author 1: Chandrashekhar Meshram Author 2: S. Download PDF. Abstract: In , Shamir [1] introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center KAC and identify him self before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key.

Scientific Research An Academic Publisher. This paper describes and compares a variety of algorithms for secure transmission of information via open communication channels based on the discrete logarithm problem that do not require search for a generator primitive element. Modifications that simplify the cryptosystem are proposed, and, as a result, accelerate its performance. It is shown that hiding information via exponentiation is more efficient than other seemingly simpler protocols. Numeric illustrations are provided. Diffie and M.

A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms

Authors : Sattar J. Aboud and Asim A. El Sheikh. Abstract: A new method for public key cryptosystem and digital signature scheme is suggested.

Authors : Chandrashekhar Meshram. Abstract: In , Shamir introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a Key Authentication Center KAC and identify him self before joining a communication network.

Asian Journal of Information Technology

A new signature scheme is proposed together with an implementation of the Diffie - Hellman key distribution scheme that achieves a public key cryptosystem. The security of both systems relies on the difficulty of computing discrete logarithms over finite fields. Skip to main content Skip to sections.

Skip to search form Skip to main content You are currently offline. Some features of the site may not work correctly. DOI: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem. The security of both systems relies on the difficulty of computing discrete logarithms over finite fields.

Skip to Main Content. A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. Use of this web site signifies your agreement to the terms and conditions. A public key cryptosystem and a signature scheme based on discrete logarithms Abstract: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem. The security of both systems relies on the difficulty of computing discrete logarithms over finite fields.

A public key cryptosystem and a signature scheme based on discrete logarithms

 - Посмотрите уран. Его сверхкритическую массу. - М-м… сто десять фунтов, - сказала Соши.

Коммандер спас ей жизнь. Стоя в темноте, она испытывала чувство огромного облегчения, смешанного, конечно же, с ощущением вины: агенты безопасности приближаются. Она глупейшим образом попала в ловушку, расставленную Хейлом, и Хейл сумел использовать ее против Стратмора.

Тайна имела первостепенное значение. Любое подозрение об изменении Цифровой крепости могло разрушить весь замысел коммандера. Только сейчас она поняла, почему он настаивал на том, чтобы ТРАНСТЕКСТ продолжал работать.

Lecture: ElGamal Public Key Cryptography
pdf download edition pdf

1 Comments

  1. Talbot A.

    It is not yet proved that breaking the system is equivalent to computing discrete logarithms. Sec- tion 4 develops some attacks on the signature scheme, none of​.

    20.04.2021 at 13:47 Reply

Leave your comment

Subscribe

Subscribe Now To Get Daily Updates