ID-Based signature scheme using elliptic curve cryptosystem

Eddie Shahril Ismail, W. S. Wan-Daud

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Chung, Huang, Lai and Chen proposed an ID-based signature scheme on the elliptic curve cryptosystem. Their scheme is secure but requires 60.12TMUL+1THfor signature generation and 87.24TMUL+1TH for signature verification. In this article, we propose a improvement of their signature scheme with three results: The improved scheme reduces about 50% and 33% of time complexity respectively for both signature generation and signature verification. The new scheme requires only one pair of secret and public keys but Chung et al.'s scheme needs two secret keys. The communication cost of the new scheme is only half of Chunget al.'s scheme.

Original languageEnglish
Pages (from-to)3615-3624
Number of pages10
JournalApplied Mathematical Sciences
Volume7
Issue number73-76
DOIs
Publication statusPublished - 2013

Fingerprint

Elliptic Curve Cryptosystem
Identity-based
Signature Scheme
Cryptography
Signature Verification
Communication
Signature
Costs
Communication Cost
Public key
Time Complexity

Keywords

  • Chosen-message attack
  • Cryptography
  • Digital signature scheme
  • Elliptic curve cryptosystem
  • Identification scheme

ASJC Scopus subject areas

  • Applied Mathematics

Cite this

ID-Based signature scheme using elliptic curve cryptosystem. / Ismail, Eddie Shahril; Wan-Daud, W. S.

In: Applied Mathematical Sciences, Vol. 7, No. 73-76, 2013, p. 3615-3624.

Research output: Contribution to journalArticle

@article{6c3209eca23e4af5848990fbb1369cf0,
title = "ID-Based signature scheme using elliptic curve cryptosystem",
abstract = "Chung, Huang, Lai and Chen proposed an ID-based signature scheme on the elliptic curve cryptosystem. Their scheme is secure but requires 60.12TMUL+1THfor signature generation and 87.24TMUL+1TH for signature verification. In this article, we propose a improvement of their signature scheme with three results: The improved scheme reduces about 50{\%} and 33{\%} of time complexity respectively for both signature generation and signature verification. The new scheme requires only one pair of secret and public keys but Chung et al.'s scheme needs two secret keys. The communication cost of the new scheme is only half of Chunget al.'s scheme.",
keywords = "Chosen-message attack, Cryptography, Digital signature scheme, Elliptic curve cryptosystem, Identification scheme",
author = "Ismail, {Eddie Shahril} and Wan-Daud, {W. S.}",
year = "2013",
doi = "10.12988/ams.2013.32121",
language = "English",
volume = "7",
pages = "3615--3624",
journal = "Applied Mathematical Sciences",
issn = "1312-885X",
publisher = "Hikari Ltd.",
number = "73-76",

}

TY - JOUR

T1 - ID-Based signature scheme using elliptic curve cryptosystem

AU - Ismail, Eddie Shahril

AU - Wan-Daud, W. S.

PY - 2013

Y1 - 2013

N2 - Chung, Huang, Lai and Chen proposed an ID-based signature scheme on the elliptic curve cryptosystem. Their scheme is secure but requires 60.12TMUL+1THfor signature generation and 87.24TMUL+1TH for signature verification. In this article, we propose a improvement of their signature scheme with three results: The improved scheme reduces about 50% and 33% of time complexity respectively for both signature generation and signature verification. The new scheme requires only one pair of secret and public keys but Chung et al.'s scheme needs two secret keys. The communication cost of the new scheme is only half of Chunget al.'s scheme.

AB - Chung, Huang, Lai and Chen proposed an ID-based signature scheme on the elliptic curve cryptosystem. Their scheme is secure but requires 60.12TMUL+1THfor signature generation and 87.24TMUL+1TH for signature verification. In this article, we propose a improvement of their signature scheme with three results: The improved scheme reduces about 50% and 33% of time complexity respectively for both signature generation and signature verification. The new scheme requires only one pair of secret and public keys but Chung et al.'s scheme needs two secret keys. The communication cost of the new scheme is only half of Chunget al.'s scheme.

KW - Chosen-message attack

KW - Cryptography

KW - Digital signature scheme

KW - Elliptic curve cryptosystem

KW - Identification scheme

UR - http://www.scopus.com/inward/record.url?scp=84880688213&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84880688213&partnerID=8YFLogxK

U2 - 10.12988/ams.2013.32121

DO - 10.12988/ams.2013.32121

M3 - Article

VL - 7

SP - 3615

EP - 3624

JO - Applied Mathematical Sciences

JF - Applied Mathematical Sciences

SN - 1312-885X

IS - 73-76

ER -