Erscheinungsdatum: 06/2011, Medium: Taschenbuch, Einband: Kartoniert / Broschiert, Titel: Proxy Blind Multi-Signature Scheme, Titelzusatz: Proxy Blind Multi-signature Scheme Using Elliptic Curve Cryptography for Handheld Devices, Autor: Kar, Jayaprakash, Verlag: LAP Lambert Acad. Publ., Sprache: Englisch, Rubrik: Informatik, Seiten: 64, Informationen: Paperback, Gewicht: 115 gr, Verkäufer: averdo
Erscheinungsdatum: 12.02.2015, Medium: Taschenbuch, Einband: Kartoniert / Broschiert, Titel: Time Stamped Proxy Blind Signature Scheme with Proxy Revocation, Autor: Panda, Suryakanta, Verlag: LAP Lambert Academic Publishing, Sprache: Englisch, Schlagworte: Computernetzwerke und maschinelle Kommunikation, Rubrik: Datenkommunikation // Netze, Mailboxen, Seiten: 60, Informationen: Paperback, Gewicht: 106 gr, Verkäufer: averdo
Proxy Blind Multi-Signature Scheme ab 48.99 € als Taschenbuch: Proxy Blind Multi-signature Scheme Using Elliptic Curve Cryptography for Handheld Devices. Aus dem Bereich: Bücher, English, International, Gebundene Ausgaben,
Time Stamped Proxy Blind Signature Scheme with Proxy Revocation ab 39.99 € als Taschenbuch: . Aus dem Bereich: Bücher, English, International, Gebundene Ausgaben,
Security and privacy are among the growing concerns of a Vehicular Ad hoc Network (VANET) which requires a high degree of liability from its participants. In this dissertation, we address security, anonymity, and privacy challenges of VANETs in the light of the IEEE standards for vehicular communications. VANET provides a variety of road-safety and other applications through wireless devices installed in vehicles and roadside infrastructure. However, a vehicle must not be able to take advantage of its anonymity for any misbehavior like sending false messages or malicious updates to other vehicles or a roadside infrastructure. We use proxy signature, identity-based signature, and elliptic curve cryptosystems to provide authentication for infrastructure generated messages, and anonymous authentication for vehicle originated messages. Also, we investigate how some of the MAC-layer weaknesses may impair the security of a VANET. Our solutions are lightweight, bandwidth friendly and compatible to the current standards of vehicular communications.
Proxy blind signature combines both the properties of blind signature and proxy signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. It gives a detail about the proxy blind signature scheme with proxy revocation which records the time stamp during proxy signing phase, based on Discrete logarithmic problem and one of its application in e-voting.
This articles describes an efficient proxy blindmulti-signature scheme using Elliptic CurveCryptography. Also describes its implementationissues i.e efficiency and size of the hardware. InECC, computationally the most expensive operation isscalar multiplication and also very important fromsecurity point of view. The implementation attacksgenerally target the computation of this operation tobreak the cryptosystem. The security of the proposedschemes is based on the difficulty of breaking theone-way hash function and the elliptic curve discretelogarithm problem (ECDLP). Best algorithm knownsolving ECDLP takes fully-exponential time. Incontrast sub-exponential time algorithms known forIFP and DLP. The attractiveness of ECC will increaserelative to other public-key cryptosystems, ascomputing power improvements force a general increasein the key size. The benefits of this higher-strengthper-bit include higher speeds, lower powerconsumption, bandwidth savings and storageefficiencies. The proposed scheme can be implementedin mobile devices such as smart card, PDA etc wherebandwidth,processing capacity, power availability, orstorage are constrained.
This book contributes to the variants of proxy signature scheme based on ECDLP without pairing. Significance of the scheme in chapters is not only to provide a secure and improved signature protocol but to enhance the efficiency of the scheme in the sense of computational operation-time with compare to the other available ID-based proxy signature schemes from pairings. These schemes do not use pairings still provid signatures in ID based settings. I believe that these signature schemes with formal security model without bilinear pairings will be helpful to bring a breakthrough towards the improvement of efficiency and security proofs of such schemes. I also believe that this work will be helpful for new researchers to enhance their interest in this field and to extend the related research in future with a vast list of references.