An Empirical Evaluation of Various Digital Signature Scheme in Wireless Sensor Network

2021 ◽  
pp. 1-11
Author(s):  
Pankaj Kumar ◽  
Saurabh Kumar Sharma
2021 ◽  
Author(s):  
Abolfazl Mehbodniya ◽  
Prikshat Kumar Angra ◽  
V. Hindumathi ◽  
Satyendra Vishwakarma ◽  
P. Rajasekar ◽  
...  

2019 ◽  
Vol 2019 ◽  
pp. 1-5 ◽  
Author(s):  
Yu Zhan ◽  
Baocang Wang

Certificateless aggregate signatures aggregate n signatures from n different users into one signature. Therefore, a verifier can judge whether all signatures are valid by verifying once. With this advantage, certificateless aggregate signatures are widely used in the environment of limited computing resources. Recently, a novel certificateless aggregate signature scheme was proposed by Kumar et al. This scheme’s security was claimed to be secure against two types of attackers under the random oracle model. In this paper, we indicate that their scheme is unable to achieve this security goal. We show an attack algorithm that the second type of attacker could forge a valid signature under an identity without the private key of the target user. Moreover, we demonstrate that the second type of attacker could forge a valid aggregate signature.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 80063-80073 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Cheng-Chi Lee ◽  
Sarita Gajbhiye Meshram ◽  
Akshaykumar Meshram

2012 ◽  
Vol 3 (1) ◽  
pp. 60-65
Author(s):  
Sukhpreet Singh ◽  
Er. Kumar Saurabh

The RSA algorithm proposed by Rivest, Adi Shamir and Leonard Adleman is cryptography technique. The current problem with wireless sensor network is how to protect the  security of the sensor data. RSA algoritm is used as a digital signature authentication in the field of security, basically works on deciding encryption variable. In this also the basic concept is to decide a description variable and then decide the description variable using same encryption variable. It is a secure and fast cryptographic system. The major effort will be applied on the RSA encryption technique in order to make node authenticated as well as to secure data while dealing with aggregation.


Sign in / Sign up

Export Citation Format

Share Document