Digital Signature Scheme Using Two Hash Functions
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 124 , Downloads: 105 | CTR: 85 % | Weekly Popularity: ⮙1

Research Paper | Mathematics | India | Volume 3 Issue 4, April 2014

Digital Signature Scheme Using Two Hash Functions

Mohammad Amir, Jarrar Ahmed, Sham Bansal, Ashish Kumar Garg, Man Singh

Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This latter present a digital signature scheme and discuss the security aspects of proposed digital signature scheme. In this scheme any third party can verify the signature validity only with the help of signature receiver. The security of proposed digital scheme is based on the difficult problem of computing discrete logarithms over finite fields (e.g. DSA and ElGamal).

Keywords: Digital Signature, One-way hash function, discrete logarithms, Security, Message

Edition: Volume 3 Issue 4, April 2014

Pages: 126 - 128

Share this Article

How to Cite this Article?

Mohammad Amir, Jarrar Ahmed, Sham Bansal, Ashish Kumar Garg, Man Singh, "Digital Signature Scheme Using Two Hash Functions", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131342, Volume 3 Issue 4, April 2014, 126 - 128

124 PDF Views | 105 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Security'

Views: 124 , Downloads: 105 | CTR: 85 % | Weekly Popularity: ⮙1

Research Paper, Mathematics, India, Volume 3 Issue 4, April 2014

Pages: 126 - 128

Digital Signature Scheme Using Two Hash Functions

Mohammad Amir, Jarrar Ahmed, Sham Bansal, Ashish Kumar Garg, Man Singh

Share this Article

Views: 121 , Downloads: 105 | CTR: 87 % | Weekly Popularity: ⮙2

Research Paper, Mathematics, India, Volume 3 Issue 6, June 2014

Pages: 587 - 589

Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar, Adesh Kumari

Share this Article

Views: 126 , Downloads: 114 | CTR: 90 % | Weekly Popularity: ⮙2

Research Paper, Mathematics, Philippines, Volume 9 Issue 5, May 2020

Pages: 1137 - 1141

School-Community Partnerships in Bulan District

Florante G. Gipit, Noel G. Benavides, Aldin D. Labo

Share this Article

Views: 133 , Downloads: 116 | CTR: 87 % | Weekly Popularity: ⮙4

Research Paper, Mathematics, Mali, Volume 8 Issue 11, November 2019

Pages: 1173 - 1178

BLS Curves with Embedding Degrees 9, 15, 21 and 27 against Small-Subgroup Attacks

Mahamadou Abdou Toure, Karim Samake, Sinaly Traore

Share this Article

Views: 162 , Downloads: 122 | CTR: 75 %

Research Paper, Mathematics, Mali, Volume 8 Issue 11, November 2019

Pages: 1659 - 1666

Optimal Ate Pairing on Elliptic Curves with Embedding Degree 21

Mahamadou Abdou TOURE, Karim SAMAKE, Sinaly TRAORE

Share this Article

Similar Articles with Keyword 'Message'

Views: 124 , Downloads: 105 | CTR: 85 % | Weekly Popularity: ⮙1

Research Paper, Mathematics, India, Volume 3 Issue 4, April 2014

Pages: 126 - 128

Digital Signature Scheme Using Two Hash Functions

Mohammad Amir, Jarrar Ahmed, Sham Bansal, Ashish Kumar Garg, Man Singh

Share this Article

Views: 131 , Downloads: 112 | CTR: 85 % | Weekly Popularity: ⮙1

Research Paper, Mathematics, India, Volume 3 Issue 5, May 2014

Pages: 1437 - 1442

Study of (2; n) ? Threshold Visual Cryptography Scheme using Different Techniques

Maneesh Kumar

Share this Article
Top