A time stamped signature scheme based on elliptic curve
Downloads
Abstract
We propose a time-stamped signature scheme based on elliptic curve. The signature consists of an authenticated
time-stamp provided by a trusted authority, known as Time-Stamping System, which provides time-stamp without
having any knowledge of the content of the document to be signed. Anyone can verify the validity of the signature
using systems public parameters, i.e. the signature is universally verifiable. The security of the proposed scheme
rely on Elliptic Curve Discrete Logarithm Problem.
Keywords:
Digital Signature, Elliptic Curve Cryptosystem (ECC), Elliptic Curve Discrete Logarithm Problem (ECDLP),, Interger Factorization Problem (IFP),, Time Stamp.Mathematics Subject Classification:
Mathematics- Pages: 562-565
- Date Published: 01-01-2021
- Vol. 9 No. 01 (2021): Malaya Journal of Matematik (MJM)
H. M. Sun, B. C. Chen, & H. T. Yeh, On the design of time-stamped signatures, Journal of Computer and System Sciences, 68(2004), 598-610.
Z Shao, Security of the design of time-stamped signatures, Joumal of Computer and System Sciences, $72(2006), 690-705$.
S. Haber, & W. S. Stornetta, How to time-stamp a digital document, In Conference on the Theory and Application of Cryplography, Springer, Berlin, Heidelberg, (1990), $437-455$.
J. Benaloh & M. de Mare, Efficient broadcast timestamping, Technical Report I TR-MCS-91-I Clarksont Universiry Department of Mathematics and Computer Science, (1991).
A. Buldas & P. Laud, New linking schemes for digital time-stamping, In ICISC 98(1998), 3-14.
A. Buldas, P. Laud, H. Lipmaa, & J. Villemson, Time-stamping with binary linking schemes, In Anutal International Cryptology Conference, Springer, Berlin, Heidelberg, (1998), 486-501.
Sujata Mohanty, Banshidhar Majhi, Sanjib Kumar Baral, A Novel Time-stamped Signature Scheme Based On DLP, $1^{text {af }}$ International Covference on Recent Advances in Information Technology, RAIT-2012, IEEE.
[I] V. S. Miller, Use of elliptic curves in cryptography, In Conference on the theory and application of cryptographic techniques, Springer, Berlin, Heidelberg, (1985), 417-426.
N. Koblitz, Elliptic curve cryptosystems, Mathematics of computation, 48(1987), 203-209.
R. L. Rivest, A. Shamir, & L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Connunicarions of the ACM, 21(1978), 120-126.
[II] T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE travsactions on infonnarion theory, 31(1985), 469-472.
Similar Articles
- Ajay Kumar, Ajendra Kumar, Vipin Kumar3, Kamesh Kumar, Graceful distance labeling for some particular graphs , Malaya Journal of Matematik: Vol. 9 No. 01 (2021): Malaya Journal of Matematik (MJM)
You may also start an advanced similarity search for this article.
Metrics
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 MJM
This work is licensed under a Creative Commons Attribution 4.0 International License.