digital signature
Recently Published Documents


TOTAL DOCUMENTS

1545
(FIVE YEARS 454)

H-INDEX

33
(FIVE YEARS 5)

2022 ◽  
Vol 2 (14) ◽  
pp. 66-74
Author(s):  
Nguyen Dao Truong ◽  
Le Van Tuan

Abstract—In this paper, we propose a method to design signature scheme on ring structure with residual classes modulo composite. At the same time, we develop several new digital signature schemes that are more secure, with faster signature generation than ElGamal digital signature scheme and its variants. Furthermore, our proposed signature scheme has overcome some weaknesses of some published signature scheme of the same type, which are built on ring structure. Tóm tắt—Trong bài báo này, chúng tôi đề xuất một phương pháp thiết kế lược đồ chữ ký trên cấu trúc vành các lớp thặng dự theo modulo hợp số, đồng thời phát triển một số lược đồ chữ ký số mới an toàn hơn, tốc độ sinh chữ ký nhanh hơn so với lược đồ chữ ký số ElGamal cùng với những biến thể của nó. Hơn nữa, lược đồ chữ ký do chúng tôi đề xuất cũng khắc phục được một số nhược điểm của một số lược đồ chữ ký cùng loại, được xây dựng trên cấu trúc vành.


2022 ◽  
Vol 1 (1) ◽  
pp. 80
Author(s):  
JiaYao Wu ◽  
LinYang Yue ◽  
JiaHui Xie ◽  
XiaoPeng Liu ◽  
MingHui Zhang

2022 ◽  
Vol 10 (2) ◽  
pp. 199
Author(s):  
I Gede Bendesa Aria Harta ◽  
I Ketut Gede Suhartana ◽  
I Gusti Ngurah Anom Cahyadi ◽  
Cokorda Pramartha ◽  
I Komang Ari Mogi ◽  
...  

Lontar is a relic of cultural heritage whose basic source of manufacture is from rontal or tal leaves containing evidence of all records of aspects of ancient historical life which include historical values, religion, philosophy, medicine, literature and other sciences so that their sustainability needs to be maintained. Security of digital lontar will make it easier to preserve a lontar work so that it is not changed or falsified by irresponsible parties, where digital lontar in PDF format will be given a digital signature to maintain the authenticity of the document. Documents that are signed will be difficult for other parties to change, if the contents of a digital ejection are changed it will cause the digital signature to change. Based on the research conducted, from the results of testing the security of digital ejection with digital signatures using the RSA algorithm, the test results from RMSE (Root Mean Square Error) for description results with an average of 69.7794143. The larger or random the description results, the more complex the description results will be.


2021 ◽  
Vol 24 (7) ◽  
pp. 90-99
Author(s):  
Mariia Danyliuk ◽  
Marta Dmytryshyn ◽  
Tetyana Goran

Modern scientific and technological progress makes the use of information, communication, and digital technologies an attribute of any business’s functioning and people’s lives. COVID-19 pandemic, which has led to widespread quarantine restrictions, has necessitated an accelerated transition to digital remote access services. In this regard, the authors have investigated the development and spread of digital technologies in Ukraine to implement e-government policy. To assess the realities and determine the prospects of becoming a “state in a smartphone”, the authors have conducted a SWOT analysis of electronic public services. The analysis allowed to identify the advantages and threats of e-government at the present stage and outline the strategies for developing Ukrainian digitalisation. In the state as a service, digital changes are taking place in many industries and spheres, so the authors have identified key components of the digital state, including cybersecurity, e-government, smart cities, digital skills, e-court, e-health care, e-transport, and the Internet. These components are closely linked to e-democracy, e-business, and e-education. In Ukraine, there is a unique state web portal of electronic services, “Diia”, which provides access to dozens of electronic state services. Therefore, the authors have studied the purpose, features of use, opportunities, and difficulties of the portal and mobile application “Diia”. In the usage part, the authors have considered the specifics of authorisation on the portal through the file media of the digital signature and built the appropriate algorithm of actions. Along with the potential risks, modern information technologies provide many opportunities for their users. Finally, the study allowed to outline the prospects for the digitalisation of the Ukrainian state in modern realities


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8417
Author(s):  
P. Thanalakshmi ◽  
R. Anitha ◽  
N. Anbazhagan ◽  
Woong Cho ◽  
Gyanendra Prasad Joshi ◽  
...  

As a standard digital signature may be verified by anybody, it is unsuitable for personal or economically sensitive applications. The chameleon signature system was presented by Krawczyk and Rabin as a solution to this problem. It is based on a hash then sign model. The chameleon hash function enables the trapdoor information holder to compute a message digest collision. The holder of a chameleon signature is the recipient of a chameleon signature. He could compute collision on the hash value using the trapdoor information. This keeps the recipient from disclosing his conviction to a third party and ensures the privacy of the signature. The majority of the extant chameleon signature methods are built on the computationally infeasible number theory problems, like integer factorization and discrete log. Unfortunately, the construction of quantum computers would be rendered insecure to those schemes. This creates a solid requirement for construct chameleon signatures for the quantum world. Hence, this paper proposes a novel quantum secure chameleon signature scheme based on hash functions. As a hash-based cryptosystem is an essential candidate of a post-quantum cryptosystem, the proposed hash-based chameleon signature scheme would be a promising alternative to the number of theoretic-based methods. Furthermore, the proposed method is key exposure-free and satisfies the security requirements such as semantic security, non-transferability, and unforgeability.


2021 ◽  
pp. 104-111
Author(s):  
Alexander Matsegorin ◽  
Oleksandra Tsaryk

Problem setting. Due to the rapid impact of information and communication technologies on commodity-money relations, which are in the sphere of civil turnover in Ukraine, the number of contracts concluded in electronic form is significantly increasing. The scope of electronic documents both in contractual civil law relations and in general in the relations of individuals with government agencies, courts and other public law entities has a clear tendency to expand and grow. Thus, in many areas of commodity-money exchange, the interaction of executors and customers (clients) has reached a completely new organizational and legal level and is carried out exclusively online, because the territorial remoteness and implementation of quarantine measures against COVID-19 is not always possible to sign an agreement on paper. These statements determine the relevance of the chosen research topic. The object of the study is the civil legal relationship using a mobile digital signature (Mobile ID). The subject of the research is the advantages and disadvantages of electronic identification with the use of mobile digital signature in civil circulation. The state of research of the problem. Such scientists as M. I. Anokhin, Yu. V. Borodakiy, N. P. Varnovsky, V. M. Glushkov, M. V. Denisova, M. M. Dutov, A.V. Kobets, G.I. Kupriyanova, A. Matvienko, V. A. Onegov, I. A. Semaev, V. A. Shakhverdov, M. N. Tsyvin, V. V. Yashchenko and others. The target of research is to study the features of the legal regulation of electronic digital signature of a person and his legal status with the analysis of issues arising from the use of such a signature in civil turnover, the formulation of proposals for their solution. Article’s main body. The possibility of using mobile digital signatures in the document flow is provided by the relevant regulations. The Law of Ukraine “On Electronic Digital Signature” adopted on May 22, 2003, defines the legal status of an electronic digital signature and regulates the relations that arise when using an electronic digital signature. This Law does not apply to relations arising from the use of other types of electronic signatures, including digitized images of handwritten signatures. At the same time, the provision of Part 3 of Article 207 of the Civil Code of Ukraine on the use of facsimile reproduction of the signature by means of mechanical, electronic or other copying, as well as electronic signature or other analogue of handwritten signature with the written consent of the parties, which must contain samples handwritten signatures. The legislative base on electronic signatures is currently constantly growing, a passport of a citizen of Ukraine in the form of a card with a contactless electronic carrier (and an electronic digital signature) has been introduced into the continuum of indirect electronic reality. The Law of Ukraine "On Electronic Commerce" of September 3, 2015 regulates the legal regulation of the field of electronic commerce in Ukraine, defines the procedure for electronic transactions with the use of information and telecommunications systems. The legal basis for the provision of electronic trust services, including cross-border, the rights and obligations of the subjects of legal relations in the field of electronic trust services are subject to the Law of Ukraine "On electronic trust services" of October 5, 2017. The number of diverse legal material causes some difficulties in the practical application of a mobile digital signature. Differences in national terminology, which are contained in different sources, as well as existing legal gaps determine the relevance of this problem and require appropriate research. Conclusions and prospects for the development. The scientific novelty of the study is a comprehensive consideration of this topic, namely: the pros and cons of using a mobile digital signature, making suggestions for improving existing legislation with concepts and functions related to the use (Mobile ID).


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3074
Author(s):  
Deepak Prashar ◽  
Mamoon Rashid ◽  
Shams Tabrez Siddiqui ◽  
Dilip Kumar ◽  
Amandeep Nagpal ◽  
...  

Localization and security are among the most dominant tasks of wireless sensor networks (WSN). For applications containing sensitive information on the location parameters of the event, secure localization is mandatory and must not be compromised at any cost. The main task, as if any node is malicious, is to authenticate nodes that are involved in the localization process. In this paper, we propose a secure hop-based algorithm that provides a better localization accuracy. In addition, to maintain the security of the localization process, the digital signature approach is used. Moreover, the impact of malicious nodes on the proposed scheme has also been observed. The proposed approach is also contrasted with the basic DV-Hop and improved DV-Hop based on error correction. From the simulation outcomes, we infer that this secure digital-signature-based localization strategy is quite robust against any node compromise attacks, thereby boosting its precision. Comparisons between the proposed algorithm and the state of the art were made on the grounds of different parameters such as the node quantity, ratio of anchor nodes, and range value towards the localization error.


Sign in / Sign up

Export Citation Format

Share Document