International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 282

Research Paper | Mathematics | India | Volume 3 Issue 4, April 2014 | Popularity: 6.1 / 10


     

Digital Signature Scheme Using Two Hash Functions

Mohammad Amir, Jarrar Ahmed, Sham Bansal, Ashish Kumar Garg, Man Singh


Abstract: Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This latter present a digital signature scheme and discuss the security aspects of proposed digital signature scheme. In this scheme any third party can verify the signature validity only with the help of signature receiver. The security of proposed digital scheme is based on the difficult problem of computing discrete logarithms over finite fields (e. g. DSA and ElGamal).


Keywords: Digital Signature, One-way hash function, discrete logarithms, Security, Message


Edition: Volume 3 Issue 4, April 2014


Pages: 126 - 128




Text copied to Clipboard!
Mohammad Amir, Jarrar Ahmed, Sham Bansal, Ashish Kumar Garg, Man Singh, "Digital Signature Scheme Using Two Hash Functions", International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, pp. 126-128, https://www.ijsr.net/getabstract.php?paperid=20131342

Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Mathematics, India, Volume 11 Issue 9, September 2022

Pages: 243 - 244

A Variant of ElGamal Digital Signature Scheme

Mohammad Amir, Brijesh Shukla

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Mathematics, India, Volume 12 Issue 2, February 2023

Pages: 996 - 997

Shift Ciphers and RSA - Encryption Algorithm

Vivek Parkash

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Mathematics, India, Volume 3 Issue 6, June 2014

Pages: 587 - 589

Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar, Adesh Kumari

Share this Article

Downloads: 115

Research Paper, Mathematics, India, Volume 3 Issue 5, May 2014

Pages: 1437 - 1442

Study of (2; n) ? Threshold Visual Cryptography Scheme using Different Techniques

Maneesh Kumar

Share this Article

Downloads: 116

Research Paper, Mathematics, Philippines, Volume 9 Issue 5, May 2020

Pages: 1137 - 1141

School-Community Partnerships in Bulan District

Florante G. Gipit, Noel G. Benavides, Aldin D. Labo

Share this Article
Top