CA2588149A1 - Un systeme de signature numerique a base de l'algorithme de division et du probleme de l'algorithme discret - Google Patents

Un systeme de signature numerique a base de l'algorithme de division et du probleme de l'algorithme discret Download PDF

Info

Publication number
CA2588149A1
CA2588149A1 CA 2588149 CA2588149A CA2588149A1 CA 2588149 A1 CA2588149 A1 CA 2588149A1 CA 2588149 CA2588149 CA 2588149 CA 2588149 A CA2588149 A CA 2588149A CA 2588149 A1 CA2588149 A1 CA 2588149A1
Authority
CA
Canada
Prior art keywords
digital signature
algorithm
int
creating
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2588149
Other languages
English (en)
Inventor
Nikolajs Volkovs
Vijaya Kumar Murty
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CA002545975A external-priority patent/CA2545975A1/fr
Application filed by Individual filed Critical Individual
Priority to CA 2588149 priority Critical patent/CA2588149A1/fr
Publication of CA2588149A1 publication Critical patent/CA2588149A1/fr
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
CA 2588149 2006-05-09 2007-05-09 Un systeme de signature numerique a base de l'algorithme de division et du probleme de l'algorithme discret Abandoned CA2588149A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA 2588149 CA2588149A1 (fr) 2006-05-09 2007-05-09 Un systeme de signature numerique a base de l'algorithme de division et du probleme de l'algorithme discret

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CACA2,545,975 2006-05-09
CA002545975A CA2545975A1 (fr) 2006-05-09 2006-05-09 Stratageme de signature numerique base sur l'algorithme de division et sur le probleme des logarithmes discrets
CA 2588149 CA2588149A1 (fr) 2006-05-09 2007-05-09 Un systeme de signature numerique a base de l'algorithme de division et du probleme de l'algorithme discret

Publications (1)

Publication Number Publication Date
CA2588149A1 true CA2588149A1 (fr) 2007-11-09

Family

ID=38663510

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2588149 Abandoned CA2588149A1 (fr) 2006-05-09 2007-05-09 Un systeme de signature numerique a base de l'algorithme de division et du probleme de l'algorithme discret

Country Status (1)

Country Link
CA (1) CA2588149A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714910B (zh) * 2009-11-20 2012-10-24 西安电子科技大学 基于概率检测的抗污染网络编码方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714910B (zh) * 2009-11-20 2012-10-24 西安电子科技大学 基于概率检测的抗污染网络编码方法

Similar Documents

Publication Publication Date Title
US7877610B2 (en) Hybrid signature scheme
CA2806357C (fr) Cryptage authentifie pour signatures numeriques avec recuperation de message
US6446207B1 (en) Verification protocol
CA2235359C (fr) Programme implicite de certificat avec chainage de ca
CA2808701C (fr) Cryptage authentifie pour signatures numeriques a recuperation de message
Shoup Why chosen ciphertext security matters
US6898284B2 (en) Cryptographic identification and digital signature method using efficient elliptic curve
CA2591280A1 (fr) Nouvelle technique de signature numerique
US20080072055A1 (en) Digital signature scheme based on the division algorithm and the discrete logarithm problem
JP3854226B2 (ja) 鍵ペア決定およびrsa鍵生成のための方法並びに装置
KR100396740B1 (ko) 계산적 디피-헬만 가정에 기반하는 안전성 증명 가능한공개키 암호화 방법
CA2588149A1 (fr) Un systeme de signature numerique a base de l'algorithme de division et du probleme de l'algorithme discret
JP2004246350A (ja) 暗号化装置および復号化装置、並びにこれらを備えた暗号システム、暗号化方法および復号化方法
US9252941B2 (en) Enhanced digital signatures algorithm method and system utilitzing a secret generator
KR100323799B1 (ko) 안전성이 증명가능한 타원곡선 공개키 암호화 시스템
Sadkhan et al. Analysis of Different Types of Digital Signature
Buenasmañanas Domínguez et al. Digital identity-based multisignature scheme implementation
Glushachenko Public key cryptosystems and their application in digital signature algorithms
Kbar et al. Modified RSA Using Triple Keys Based Encryption/Decryption
WO1998047260A2 (fr) Recuperation de cle verifiable publiquement
Rizomiliotis Cryptography Lecture 1
Sheela et al. InKeSi-Increased Key Size Method in SRNN Public Key Cryptography Algorithm
Kommera et al. A Closer look at RSA and ECC
Al-Absi et al. Cryptography Survey of DSS and DSA Algorithms
Wiener CryptoBytes

Legal Events

Date Code Title Description
FZDE Dead