A New Digital Signature Algorithm Similar to ELGamal Type

@article{Chen2010AND,
  title={A New Digital Signature Algorithm Similar to ELGamal Type},
  author={Haipeng Chen and Xuanjing Shen and Yingda Lv},
  journal={JSW},
  year={2010},
  volume={5},
  pages={320-327}
}
Application of digital signature technology becomes more extensive, but many exposed digital signature algorithms have increasingly revealed some shortcomings and deficiencies. Aiming directly at the frequently used digital signature technologies, which are weak to Substitution Attack and Homeostasis Attack, the authors perform the hash transformation on messages before signature. Then, a hash round function is constructed, which simultaneously satisfies the characters of balance, high… CONTINUE READING
2 Citations
22 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 22 references

Signature scheme with message recovery based on discrete logarithm s and factoring

  • X. F. Yuan, R. Y. Sun, J. Q. Sun, Y. H. Yang
  • Computer Applications. vol. 27,
  • 2007

Formal model of proxy multi-signature and a construction

  • Q. Wang, Z. F. Cao
  • Chinese Journal of Computers. vol. 29,
  • 2006

Design of generalized EIGamal type digitai signature scheme based on discrete logarithm

  • L. Harn, Y. Xu
  • Electronic Letters
  • 2005

Enhancing the security of EIGamal's signature scheme

  • J. He, T. Keisler
  • IEEE proc. Comput. Digit.Tech. vol. 141,
  • 2004

Rueppel, “New digital signature scheme based on discrete logarithm (comment)

  • R.A.K. Nyberg
  • Electronic Letters. vol. 30,
  • 2004

Enhancing the Security of Generilized ElGamal Type Signature Schemes

  • M. Qi, G. Z. Xiao
  • Acta Electronica Sinica, vol.24,
  • 2003

LUC public-key encryption

  • P. Smith
  • Dr.Dobb's Journal. pp
  • 2003

New On-Line Secret Sharing Scheme Using Hash Function

  • W. F. Ji, X. X. Wu, S. Z. Jin, D. H. Yuan
  • Acta Electronica Sinica. vol. 31,
  • 2003
1 Excerpt

A Survey of Bent Functions

  • J. F. Dillon
  • NSA Mathematical Meeting,
  • 2002

Similar Papers

Loading similar papers…