A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature

Author(s):  
You Zhai ◽  
Guangquan Xu ◽  
Yao Zhang
Author(s):  
Anna ILYENKO ◽  
Sergii ILYENKO ◽  
Yana MASUR

In this article, the main problems underlying the current asymmetric crypto algorithms for the formation and verification of electronic-digital signature are considered: problems of factorization of large integers and problems of discrete logarithm. It is noted that for the second problem, it is possible to use algebraic groups of points other than finite fields. The group of points of the elliptical curve, which satisfies all set requirements, looked attractive on this side. Aspects of the application of elliptic curves in cryptography and the possibilities offered by these algebraic groups in terms of computational efficiency and crypto-stability of algorithms were also considered. Information systems using elliptic curves, the keys have a shorter length than the algorithms above the finite fields. Theoretical directions of improvement of procedure of formation and verification of electronic-digital signature with the possibility of ensuring the integrity and confidentiality of information were considered. The proposed method is based on the Schnorr signature algorithm, which allows data to be recovered directly from the signature itself, similarly to RSA-like signature systems, and the amount of recoverable information is variable depending on the information message. As a result, the length of the signature itself, which is equal to the sum of the length of the end field over which the elliptic curve is determined, and the artificial excess redundancy provided to the hidden message was achieved.


2012 ◽  
Vol 6-7 ◽  
pp. 773-777 ◽  
Author(s):  
Yan Ling Wang

The intense competition of global markets and consumers' high expectations forced enterprises to invest and concentrate on the relationship with their customers and suppliers. The growing interest in supply chain management, both in developed and developing countries in the fisheries. With the catastrophic events in the fisheries supply chain, the diversity of the fisheries risk and insurance issues become increasingly important. However, participants in the supply chain is a separate and independent economic entities, and only consider their own interests. In this article, the fisheries supply chain insurance contract on the basis of the model and the diversity of the fisheries risk and insurance policy issues, the behavior of each participant. In this article, the diversity of the fisheries supply chain risk and insurance process, the lack of sufficient knowledge of the fisheries supply chain contract signing or the exact probability of the insured event, the fisheries supply chain risk insurance companies use the information provided by the fisheries supply chain contract signature the signing of the contract or the behavior of the fisheries supply chain insurers of people insured or fisheries supply chain and fisheries supply chain in order to establish the parameters of the insurance contract of the fisheries supply chain.


Author(s):  
Rohit Chadha ◽  
John C. Mitchell ◽  
Andre Scedrov ◽  
Vitaly Shmatikov
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document