dc.contributor.author | Eddie Shahril, Ismail, Dr. | |
dc.contributor.author | Wan Suhana, Wan Daud | |
dc.date.accessioned | 2014-04-08T07:03:16Z | |
dc.date.available | 2014-04-08T07:03:16Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Applied Mathematical Sciences, vol. 7(73-76), 2013, pages 3615-3624 | en_US |
dc.identifier.issn | 1312-885X (P) | |
dc.identifier.issn | 1314-7552 (O) | |
dc.identifier.uri | http://www.m-hikari.com/ams/ams-2013/ams-73-76-2013/32121.html | |
dc.identifier.uri | http://dspace.unimap.edu.my:80/dspace/handle/123456789/33529 | |
dc.description | Link to publisher's homepage at http://www.m-hikari.com/ | en_US |
dc.description.abstract | Chung, Huang, Lai and Chen proposed an ID-based signature scheme on the elliptic curve cryptosystem. Their scheme is secure but requires 60.12TMUL+1THfor signature generation and 87.24TMUL+1TH for signature verification. In this article, we propose a improvement of their signature scheme with three results: The improved scheme reduces about 50% and 33% of time complexity respectively for both signature generation and signature verification. The new scheme requires only one pair of secret and public keys but Chung et al.'s scheme needs two secret keys. The communication cost of the new scheme is only half of Chunget al.'s scheme. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Hikari Ltd | en_US |
dc.subject | Chosen-message attack | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Digital signature scheme | en_US |
dc.subject | Elliptic curve cryptosystem | en_US |
dc.subject | Identification scheme | en_US |
dc.title | ID-Based signature scheme using elliptic curve cryptosystem | en_US |
dc.type | Article | en_US |
dc.contributor.url | esbi@pkrisc.cc.ukm.my | en_US |
dc.contributor.url | wsuhana@unimap.edu.my | en_US |