scholarly journals A Review of Digital Signature Using Different Elliptic Cryptography Technique

2016 ◽  
Vol 15 (8) ◽  
pp. 6976-6978
Author(s):  
Anurag Singh Bhadoria ◽  
Anurag Jain

Authentication and verification of digital data is important phase in internet based transaction and data access. For the authentication and verification used digital signature operation. For the operation of digital signature various cryptography techniques is used. The strength of cryptography technique measures the strength of digital signature. For the strength improvement various cryptography techniques is used such as RSA, ECC and some other bit level cryptography technique. In this paper present the review of digital signature technique basically based on elliptic curve cryptography technique. The elliptic curve cryptography technique is much stronger than other cryptography technique. 

2010 ◽  
Vol 34-35 ◽  
pp. 1024-1027 ◽  
Author(s):  
Ai Wan Fan ◽  
Shu Xi Lu

In elliptic curve cryptography, reverse-mode operation is the impact on the efficiency of digital signature one of the most important factor. Analysis of the limited domain of elliptic curve digital signature process, to prove the correctness of the algorithm, a non-mode based on the inverse operation of the elliptic curve digital signature algorithm, the algorithm does not reduce the security on the basis of improved algorithms Efficiency.


2020 ◽  
Vol 17 (12) ◽  
pp. 5516-5519
Author(s):  
A. Vikram ◽  
G. Gopinath

Hospital patient record that is stored in public cloud demands high level of security and access control. To guarantee the proper user access, an authentication scheme is required that can follow up data access. In this paper, counter based authentication verification is introduced. This method utilizes token generation and counter strategy. Elliptic curve based digital signature is employed in token generation. Along with the generated token, the data is encrypted and a counter value is appended to it. Whenever an authorized user views or modifies the stored data, the counter value is updated. Thus, this method significantly identifies an unauthorized data access.


2010 ◽  
Vol 3 (1) ◽  
pp. 75
Author(s):  
D. B. Ojha ◽  
Ms. Shree ◽  
A. Dwivedi ◽  
A. Mishra

We established a new approach for cryptographic digital signature scheme based on Mandelbrot and Julia fractal sets. We have embedded the features of ECC (elliptic curve cryptography) to the digital signature scheme based on Mandelbrot and Julia fractal sets. We offered a digital signature that has advantages of both the fractal based digital signature as well as of elliptic curve digital signature.Keywords: Fractal; ECC; Digital signature.© 2011 JSR Publications. ISSN: 2070-0237 (Print); 2070-0245 (Online). All rights reserved.doi:10.3329/jsr.v3i1.4694                 J. Sci. Res. 3 (1), 75-79 (2011)


Sign in / Sign up

Export Citation Format

Share Document