Secure Digital Signature Scheme against Chosen Message Attacks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Secure Digital Signature Scheme against Chosen Message Attacks

Maheshkumar Zilla, K. Raghavendra Rao

Digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses secure against an adaptive chosen-message attack: Receiver who receives signatures for messages of his choice (where each message may be chosen in a way that depends on the signatures of previously chosen messages) cannot later forge the signature. This is surprising, since the properties of having forgery being equivalent to factoring and being invulnerable to an adaptive chosen-message attack were considered in the folklore to be contradictory. More commonly, we show how to construct a signature scheme with such properties based on the existence of a claw-free pair of permutations a potentially weaker assumption than the intractability of integer factorization. The new scheme is potentially realistic: signing and verifying signatures are practically fast, and signatures are compact.

Keywords: Cryptography, digital signatures, factoring, chosen-message attacks, authentication, trap-door permutations, randomization

Edition: Volume 3 Issue 9, September 2014

Pages: 1475 - 1480

Share this Article

How to Cite this Article?

Maheshkumar Zilla, K. Raghavendra Rao, "Secure Digital Signature Scheme against Chosen Message Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14457, Volume 3 Issue 9, September 2014, 1475 - 1480

101 PDF Views | 80 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1436 - 1439

Secure Transmission in Ad-hoc Network: Using Combined Cryptography

Nilesh T Patil

Share this Article

Similar Articles with Keyword 'digital signatures'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1475 - 1480

Secure Digital Signature Scheme against Chosen Message Attacks

Maheshkumar Zilla, K. Raghavendra Rao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2750 - 2752

Secrecy Preserving Public Ascertaining for Cloud Storage Using Digital Signature

Rekha A, Padmashree G

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 118 - 122

The Design of Web Based Secure Internet Voting System for Corporate Election

Jagdish B. Chakole, P. R. Pardhi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013

Pages: 112 - 116

Authentication of an Image over Wireless Channels Based on Secure Digital Signature Scheme

A. Swetha, P. Chenna Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 668 - 673

A Secure Group Sharing Framework Using TGDH Scheme

Shahina K M

Share this Article

Similar Articles with Keyword 'factoring'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1475 - 1480

Secure Digital Signature Scheme against Chosen Message Attacks

Maheshkumar Zilla, K. Raghavendra Rao

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1166 - 1171

Literature Survey on a New Advanced Refactoring Based Approach for Parallelism Using Heterogeneous Parallel Architectures

Shanthi Makka, Bharat Bushan Sagar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 3, March 2019

Pages: 1076 - 1079

Startup Business Details Using Recommendation Algorithm

Indra G, Bhavani B, Chandra K, Deepika S, Keerthiga S

Share this Article

Similar Articles with Keyword 'authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2234 - 2237

Analysis of Protective Mechanism in Roaming Network for Secure Communication

Ashwini A. Lokhande, Sonali U. Nimbhorkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Similar Articles with Keyword 'randomization'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1475 - 1480

Secure Digital Signature Scheme against Chosen Message Attacks

Maheshkumar Zilla, K. Raghavendra Rao

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1758 - 1762

Privacy-Preserving Data Mining using RDT Framework and C4.5

Komal N. Chouragade, Trupti H. Gurav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 159 - 164

Accuracy-Privacy Comparison for Enhanced Grouping using a Hybrid Data Mining Technique

Dilbahar Singh, Sumit Kumar Yadav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2068 - 2071

Bottom-Up Generalization: A Data Mining Solution to Privacy Protection

Vishakha B. Dalvi, Ranjit R. Keole

Share this Article
Top