digital signature research papers 2012

digital signature research papers 2012





New ID-Based Digital Signature Scheme on Factoring and Discrete Logarithms
free download

ABSTRACT The past years have seen many attempts to construct identity based signature schemes on a single hard problem, like factoring or discrete logarithms. But in the near future, those systems will no longer be secure if the solution of factoring or discrete

The Role of Data Integrity in EU Digital Signature Legislation-Achieving Statutory Trust for Sanitizable Signature Schemes
free download

We analyse the legal requirements that digital signature schemes have to fulfil to achieve the Statutory Trust granted by the EU electronic signature laws (legally equivalent to hand- written signatures). Legally, we found that the possibility to detect subsequent changes is

Digital Signature Scheme for Image
free download

ABSTRACT Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical

Forgery-Resilience for Digital Signature Schemes
free download

ABSTRACT We introduce the notion of forgery-resilience for digital signature schemes, a new paradigm for digital signature schemes exhibiting desirable legislative properties. It evolves around the idea that, for any message, there can only be a unique valid signature,

Low Power Elliptic Curve Digital Signature Design for Constrained Devices
free download

ABSTRACT Digital signatures represent one of the most widely used security technologies for ensuring unforgeability and non-repudiation of digital data. In this paper a reduced power dissipation of hardware Elliptic Curve Digital Signature design has been developed. Our

Modified ElGamal over RSA Digital Signature Algorithm (MERDSA)
free download

ABSTRACT Generally digital signature algorithms are based on a single hard problem like prime factorization problem, discrete logarithm problem, elliptic curve problem. If one finds solution of this single hard problem then these digital signature algorithms will no longer

Use of Digital Signature and Rijndael Encryption Algorithm to Enhanced Security of data in Cloud Computing Services
free download

ABSTRACT Cloud computing is an amazing technology above all other types of computing. Cloud computing implies sharing of computing resources rather than having local servers or personal individual devices to handle the applications. The goal of cloud computing is to

Design of Digital Signature Algorithm by Fractals and Chaos Theory
free download

ABSTRACT Message Authentication Code is a function of the message and a secret key that produces a fixed-length value that serves as the authenticator. MAC provides authentication and confidentiality. This authentication technique does not include measures to counter

A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
free download

T Lakshmanan, M Muthusamy ABSTRACT Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (SHA-192). It uses a famous secure hash

A new Digital Signature Algorithm based on Factorization and Discrete Logarithm problem
free download

S Vishnoi, V Shrivastava ABSTRACT. Generally, digital signature algorithms are based on a single hard problem like prime factorization problem, discrete logarithm problem, elliptic curve problem. If one finds solution of this single hard problem then these digital signature algorithms will no longer

Union of RSA algorithm, Digital signature And KERBEROS in cloud security
free download

M Hojabri, M Heidari ,irnetexplore.ac.in ABSTRACT as we know cloud computing is one of the famous part of IT enterprise and nowdays it make many challange for growing the security issues. The security is most important for all domain in computer network and also the cloud is one facility with internet

Paper-based Document Authentication using Digital Signature and QR Code
free download

Department of Computer Science, Graduate School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi, Bangkok 10240 ThailandAbstract. There are still needs for paper-based documents in certain circumstances where

Digital Signature on-line, One Time Private Key [OTPK]
free download

VM Vaze ABSTRACT Downsizing of computersrequirement of higher security has shifted the demand for enhanced security solutions. Need of the hour is to have a security system which is doubly safe, and yet suitable for hand held devices. One Time Private Key (OTPK) allows

An Efficient Implementation of Digital Signature Algorithm with SRNN Public Key Cryptography
free download

ABSTRACT Digital Signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. This architecture is related with Secure Hash Function and 512-bit SRNN

USING DIGITAL SIGNATURE FOR EFFECTIVE AUTHENTICATION AND TAMPER DETECTION OF IMAGES
free download

KK Kothamasu, VK Sehagal ,gjmr.org ABSTRACT Due to improvements in imaging technologies and the ease with which digital content can be created and manipulated, there is need for the copyright protection of digital content. The ease of making exact copies of the multimedia data has urged the need for

1 Digital Signature Schemes
free download

CY Koo, N Yakovenko, J Blank ,cs.umd.edu In this lecture, we introduce the notion of digital signature schemes, show a construction of a one-time signature scheme based on one-way functions in the standard model [4], and then cover the full-domain-hash (FDH) signature scheme based on trapdoor permutations in

ON THE ORIGINAL ONE-WAY FUNCTION AND THE NEW DIGITAL SIGNATURE SCHEME
free download

R Megrelishvili ,viam.science.tsu.ge ABSTRACT In this paper the author presents the original approach to the synthesis of matrixbased one-way function and key exchange algorithm via an open channel together with the new digital signature algorithm, which is highly valuable because of its

Digital Signature: A Novel Adaptative Image Segmentation Approach
free download

Partitioning or segmenting an entire image into distinct recognizable regions is a central challenge in computer vision which has received increasing attention in recent years. It is remarkable how a simple task to humans is not so simple in computer vision, but it can be

An Improved Version of the Visual Digital Signature Scheme
free download

A Jaafar, A Samsudin ABSTRACT The issue of authenticity in data transfer is very important in many communications. In this paper, we propose an improved version of the visual digital signature scheme with enhanced security. The improvement was made based on Yang s non-expansion visual

AComparative STUDY OF CRYPTOSYSTEMS WITH ELLIPTIC CURVE CRYPTOGRAPHY USING DIGITAL SIGNATURE
free download

S Shukla, DL Gupta, AK Malviya ,International Journal ABSTRACT Elliptic Curve Cryptography (ECC) is coming forth as an attractive public key cryptosystem for mobile/wireless environments compared to conventional cryptosystems like RSA and DSA. ECC provides better security with smaller key sizes, which results in faster

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA
free download

K Govinda, V Gurunathaprasad, H Sathishkumar ,rspublication.com ABSTRACT Cloud computing is the way of providing computing resources in the form of service rather than a product, utilities are provided to the users over internet. The main goal of cloud computing concept is to secure, protect the data and the processes which come

Make a Secure Connection Using Elliptic Curve Digital Signature
free download

H Modares, MT Shahgoli, H Keshavarz There are several public key cryptography, such as RSA and El-Gamal and Elliptic curve cryptography. Elliptic Curve Cryptography (ECC) is considered more suitable than other public key cryptography algorithms because of its small key size. ECC is chosen in this

A Cloud-aided RSA Signature Scheme for Digital Forensics Applications
free download

ABSTRACT. The privacy of data or plain is an important issue in cloud computing. Therefore, to solve the problem, we establish the environment of cloud computing to process data with privacy and apply our scheme in the area of digital forensics for RSA signature algorithm.

Related

cryptography-research-papers-2012-section 7

computer network research papers 2012 CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER