Open Access   Article Go Back

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

Surbhi Sharma1

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-3 , Page no. 111-115, Mar-2016

Online published on Mar 30, 2016

Copyright © Surbhi Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Surbhi Sharma, “Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.111-115, 2016.

MLA Style Citation: Surbhi Sharma "Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme." International Journal of Computer Sciences and Engineering 4.3 (2016): 111-115.

APA Style Citation: Surbhi Sharma, (2016). Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme. International Journal of Computer Sciences and Engineering, 4(3), 111-115.

BibTex Style Citation:
@article{Sharma_2016,
author = {Surbhi Sharma},
title = {Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2016},
volume = {4},
Issue = {3},
month = {3},
year = {2016},
issn = {2347-2693},
pages = {111-115},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=838},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=838
TI - Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme
T2 - International Journal of Computer Sciences and Engineering
AU - Surbhi Sharma
PY - 2016
DA - 2016/03/30
PB - IJCSE, Indore, INDIA
SP - 111-115
IS - 3
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1494 1394 downloads 1480 downloads
  
  
           

Abstract

The digital signature system is more powerful than the authentication systems, because the digital signatures support both authentication and non-repudiation. Non-repudiation is necessary for the applications like electronic commerce, digital cash, banking applications, electronic voting etc. Here an efficient scheme based on RSA and arbitrary – precision numbers is discussed which is very secure. Also a secret sharing scheme is discussed which is based on visual cryptography. If the private key of users are compromised then intruder can use it illegitimately for signing purpose. So here the ways has been proposed to increase security of digital signatures by using combination of public key cryptography and secret sharing technique.

Key-Words / Index Term

Digital Signatures; Arbitrary precision numbers; Secret sharing scheme using visual cryptography

References

[1] ITU-T Recommendation X.509, ISO/IEC 9594-8, Information Technology - Open Systems Interconnection - The Directory: Authentication Framework, 1993.
[2] S.R Subramanyam and Byung K.Yi, ”Digital Signatures”, IEEE, April 2006.
[3] Alexander W.Dent , “Choosing key sizes for cryptography”, Elsevier Ltd. , University Of London, Royal Holloway, UK, 2010, pp.21-27.
[4] William Stallings “Network Security Essentials (Applications and Standards)”, Pearson Education,2004.
[5] R.L. Rivest ,A. Shamir, L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM ,1978, pp. 120–126.
[6] Digital security standard, federal information processing standard publication, available at http://dx.doi.org/10.6028/nist.fips.186-4,issue July 2013.
[7] Kai Wang et al.,”A multiple secret sharing scheme based on matrix projection”,Proceedings of 33rd annual IEEE international computer software and applications conference,U.S.A,2009,pp.400-405.
[8] A.Shamir,”How to share a secret”,Communication of ACM,vol.22,1979,pp-612-613.
Li Bai and Xukai Zou,”A proactive secret sharing scheme in matrix projection method”,International Journal of Security and Networks