Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014
Secure Digital Signature Scheme against Chosen Message Attacks
Maheshkumar Zilla, K. Raghavendra Rao
Digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses secure against an adaptive chosen-message attack: Receiver who receives signatures for messages of his choice (where each message may be chosen in a way that depends on the signatures of previously chosen messages) cannot later forge the signature. This is surprising, since the properties of having forgery being equivalent to factoring and being invulnerable to an adaptive chosen-message attack were considered in the folklore to be contradictory. More commonly, we show how to construct a signature scheme with such properties based on the existence of a claw-free pair of permutations a potentially weaker assumption than the intractability of integer factorization. The new scheme is potentially realistic: signing and verifying signatures are practically fast, and signatures are compact.
Keywords: Cryptography, digital signatures, factoring, chosen-message attacks, authentication, trap-door permutations, randomization
Edition: Volume 3 Issue 9, September 2014
Pages: 1475 - 1480
How to Cite this Article?
Maheshkumar Zilla, K. Raghavendra Rao, "Secure Digital Signature Scheme against Chosen Message Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14457, Volume 3 Issue 9, September 2014, 1475 - 1480
101 PDF Views | 80 PDF Downloads
Similar Articles with Keyword 'Cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1436 - 1439Secure Transmission in Ad-hoc Network: Using Combined Cryptography
Nilesh T Patil
Similar Articles with Keyword 'digital signatures'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1475 - 1480Secure Digital Signature Scheme against Chosen Message Attacks
Maheshkumar Zilla, K. Raghavendra Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2750 - 2752Secrecy Preserving Public Ascertaining for Cloud Storage Using Digital Signature
Rekha A, Padmashree G
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013
Pages: 118 - 122The Design of Web Based Secure Internet Voting System for Corporate Election
Jagdish B. Chakole, P. R. Pardhi
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013
Pages: 112 - 116Authentication of an Image over Wireless Channels Based on Secure Digital Signature Scheme
A. Swetha, P. Chenna Reddy
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 668 - 673A Secure Group Sharing Framework Using TGDH Scheme
Shahina K M
Similar Articles with Keyword 'factoring'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1475 - 1480Secure Digital Signature Scheme against Chosen Message Attacks
Maheshkumar Zilla, K. Raghavendra Rao
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1166 - 1171Literature Survey on a New Advanced Refactoring Based Approach for Parallelism Using Heterogeneous Parallel Architectures
Shanthi Makka, Bharat Bushan Sagar
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 3, March 2019
Pages: 1076 - 1079Startup Business Details Using Recommendation Algorithm
Indra G, Bhavani B, Chandra K, Deepika S, Keerthiga S
Similar Articles with Keyword 'authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1724 - 1727Privacy Preserving Authenticity Framework for Shared Data Cloud Network
P. Vanitha Sree, K. Narayana Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Similar Articles with Keyword 'randomization'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1475 - 1480Secure Digital Signature Scheme against Chosen Message Attacks
Maheshkumar Zilla, K. Raghavendra Rao
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 2084 - 2088Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission
Shital Gawahale, Rekha Jadhav
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1758 - 1762Privacy-Preserving Data Mining using RDT Framework and C4.5
Komal N. Chouragade, Trupti H. Gurav
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 159 - 164Accuracy-Privacy Comparison for Enhanced Grouping using a Hybrid Data Mining Technique
Dilbahar Singh, Sumit Kumar Yadav
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2068 - 2071Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
Vishakha B. Dalvi, Ranjit R. Keole