CFP last date
15 October 2024
Reseach Article

An Efficient Organizational Signature Schemes based on the Elliptic Curve Cryptography

by Shereen M. Mahgoub, Ali M. Allam, Ihab Abdel-wahab Ali
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 11
Year of Publication: 2014
Authors: Shereen M. Mahgoub, Ali M. Allam, Ihab Abdel-wahab Ali
10.5120/ijais14-451251

Shereen M. Mahgoub, Ali M. Allam, Ihab Abdel-wahab Ali . An Efficient Organizational Signature Schemes based on the Elliptic Curve Cryptography. International Journal of Applied Information Systems. 7, 11 ( November 2014), 7-10. DOI=10.5120/ijais14-451251

@article{ 10.5120/ijais14-451251,
author = { Shereen M. Mahgoub, Ali M. Allam, Ihab Abdel-wahab Ali },
title = { An Efficient Organizational Signature Schemes based on the Elliptic Curve Cryptography },
journal = { International Journal of Applied Information Systems },
issue_date = { November 2014 },
volume = { 7 },
number = { 11 },
month = { November },
year = { 2014 },
issn = { 2249-0868 },
pages = { 7-10 },
numpages = {9},
url = { https://www.ijais.org/archives/volume7/number11/692-1251/ },
doi = { 10.5120/ijais14-451251 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:55:47.696082+05:30
%A Shereen M. Mahgoub
%A Ali M. Allam
%A Ihab Abdel-wahab Ali
%T An Efficient Organizational Signature Schemes based on the Elliptic Curve Cryptography
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 7
%N 11
%P 7-10
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We introduce the notation of organizational signature. This is a new variant of digital signature, which allows the organization to obtain the signature of any employee not as an individual but through his affiliation. Due to this signature, an organization, e. g. company, can create different signatures related to each position. Elliptic curves discrete logarithm problem (ECDLP) has a low computational cost and small key size, comparing with the factorization problem of RSA. In this paper, we introduce the notion of organizational signature schemes; show a construction of organizational signature schemes based on Elliptic Curve Cryptography (ECC) in the standard model.

References
  1. Ihab A. Ali, Shereen M. Mahgoub, and Ali M. Allam, "A New direction in Digital Signature Systems: Organizational signature "International Journal of Computer Information Systems, Vol. 3, No. 4, 2011.
  2. Chaum, and van Heyst, "Group signatures," Advances in Cryptology — EUROCRYPT '91, Lecture Notes in Computer Science 547, pp. 257–265, 1991.
  3. David Chaum, and Hans van Antwerpen, "Undeniable Signatures," Crypto'89, LNCS 435, Springer-Verlag, pp. 212-216, Berlin 1990.
  4. Wang, Kerui, Qiuliang Xu, and Guoyan Zhang. "A Secure Threshold Signature Scheme from Lattices. " Computational Intelligence and Security (CIS), 2013 9th International Conference on. IEEE, Dec. 2013.
  5. Limin Sha. "Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme. " Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2014 15th IEEE/ACIS International Conference on. IEEE, July 2014.
  6. N. Koblitz. "Elliptic curve cryptosystems. " Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.
  7. V. Miller. "Uses of elliptic curves in Cryptography. " Advances in Cryptology-CRYPTO 85, Proceedings, Lecture Notes in Computer Science, No 218, pp. 417-426, Springer-Verlag, 1985.
  8. R. Y. Y. Cao and C. Fu, "An efficient implementation of RSA digital signature algorithm," Intelligent Computation Technology and Automation (ICICTA), 2008.
  9. T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. IT-31, pp. 469-472, 1985.
  10. Hung-Zih Liao, and Yuan-Yuan Shen, "On the Elliptic Curve Digital Signature Algorithm," Tunghai Science Vol. 8, pp. 109-126, July 2006.
  11. F. Vercauteren, "Elliptic Curve Discrete Logarithm Problem", [Online], Kotholieke Universiteit Leuven, 2005,Available:http://homes. esat. kuleuven. be/~fvercaut/talks/ECDL. pdf.
  12. J. Kar, "Proxy Blind Multi-signature Scheme using ECC for handheld devices," Available at "International Association for Cryptology Research", http://eprint. iacr. org/2011/043. pdf, 2011.
  13. A. Menezes, P. C Van Oorschot and S. A Vanstone Handbook of applied cryptography. CRC Press, 1997.
  14. B. Yu, "Establishment of elliptic curve cryptosystem," IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 1165–1167, December 2010.
  15. S. K. Nayak, B. Majhi, and S. Mohanty, "An ECDLP based untraceable blind signature scheme," Second IEEE International Conference on Circuits, Power and Computing Technologies (ICCPCT), pp. 829 - 834, 20-21 March 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic curve cryptography; organizational signature; public key cryptography; discrete logarithm problem