{"title":"一种先进的数字签名方案混合技术","authors":"H. Elkamchouchi, Ali E. Takieldeen, M. Shawky","doi":"10.1109/ICEEE2.2018.8391365","DOIUrl":null,"url":null,"abstract":"Sharing information and data over unsecured channel is liable for stealing and attacking, as a result cryptography becomes one of the most indispensable issues that provides data authentication. In this paper, a new technique of digital signature scheme has been proposed which combines elliptic curve cryptosystem (ECC) with Ong, Schnorr and Shamir signature scheme (OSS). A self-invertible 4^4 key matrix will be used as apart from OSS signature equations which will increase the overall security and efficiency against cryptanalytic attack. Elaborated results in terms of implementation and security analysis are declared and approved its strength. The proposed technique can be used as a secure alternative protocol if known systems are broken.","PeriodicalId":6482,"journal":{"name":"2018 5th International Conference on Electrical and Electronic Engineering (ICEEE)","volume":"10 1","pages":"375-379"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An advanced hybrid technique for digital signature scheme\",\"authors\":\"H. Elkamchouchi, Ali E. Takieldeen, M. Shawky\",\"doi\":\"10.1109/ICEEE2.2018.8391365\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Sharing information and data over unsecured channel is liable for stealing and attacking, as a result cryptography becomes one of the most indispensable issues that provides data authentication. In this paper, a new technique of digital signature scheme has been proposed which combines elliptic curve cryptosystem (ECC) with Ong, Schnorr and Shamir signature scheme (OSS). A self-invertible 4^4 key matrix will be used as apart from OSS signature equations which will increase the overall security and efficiency against cryptanalytic attack. Elaborated results in terms of implementation and security analysis are declared and approved its strength. The proposed technique can be used as a secure alternative protocol if known systems are broken.\",\"PeriodicalId\":6482,\"journal\":{\"name\":\"2018 5th International Conference on Electrical and Electronic Engineering (ICEEE)\",\"volume\":\"10 1\",\"pages\":\"375-379\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 5th International Conference on Electrical and Electronic Engineering (ICEEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEEE2.2018.8391365\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 5th International Conference on Electrical and Electronic Engineering (ICEEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEE2.2018.8391365","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An advanced hybrid technique for digital signature scheme
Sharing information and data over unsecured channel is liable for stealing and attacking, as a result cryptography becomes one of the most indispensable issues that provides data authentication. In this paper, a new technique of digital signature scheme has been proposed which combines elliptic curve cryptosystem (ECC) with Ong, Schnorr and Shamir signature scheme (OSS). A self-invertible 4^4 key matrix will be used as apart from OSS signature equations which will increase the overall security and efficiency against cryptanalytic attack. Elaborated results in terms of implementation and security analysis are declared and approved its strength. The proposed technique can be used as a secure alternative protocol if known systems are broken.