CFP last date
20 May 2024
Reseach Article

Design of a Dual Signature Scheme using ECDSA in Set Protocol

by Arpita Sarkar, Sachin Tripathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 11
Year of Publication: 2014
Authors: Arpita Sarkar, Sachin Tripathi
10.5120/15393-3565

Arpita Sarkar, Sachin Tripathi . Design of a Dual Signature Scheme using ECDSA in Set Protocol. International Journal of Computer Applications. 88, 11 ( February 2014), 1-5. DOI=10.5120/15393-3565

@article{ 10.5120/15393-3565,
author = { Arpita Sarkar, Sachin Tripathi },
title = { Design of a Dual Signature Scheme using ECDSA in Set Protocol },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 11 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number11/15393-3565/ },
doi = { 10.5120/15393-3565 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:07:19.197065+05:30
%A Arpita Sarkar
%A Sachin Tripathi
%T Design of a Dual Signature Scheme using ECDSA in Set Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 11
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Dual signature is a significant modernization of SET protocol. The function of the dual signature is to guarantee the authenticity and integrity of data. It links two messages wished-for for two different recipients In this case; the customer wants to send the order information (OI) to the trader and the payment information (PI) to the bank. The one recipient should not need to know another recipient's information. The link is needed so that the customer can confirm that the payment is intended for this order. Elliptic Curve Digital Signature Algorithm (ECDSA) which is one of the variants of Elliptic Curve Cryptography (ECC) have newly come into wide consideration, particularly by the standard developers, as an alternatives to established standard cryptosystems such as the integer factorization cryptosystems and the cryptosystems based on the discrete logarithm problem. The main reason for the attractiveness of ECDSA is the fact that there is no sub exponential algorithm known to solve the elliptic curve discrete logarithm problem on a properly chosen elliptic curve. The present work is first designing a dual signature scheme with ECDSA then comparing their experimental running-times with RSA in an attempt to measure the experimental time efficiencies of each. Simulation results show that proposed design of dual signature scheme reduces the design complexity and computation time of dual signature generation at the same time when ECDSA is applied for dual signature in place of RSA in SET protocol it scales enhanced than RSA.

References
  1. SET Secure Electronic Transaction Specification: Formal Protocol. Definition, May 1997.
  2. W. Stallings, "Cryptography and Network Security 4th Ed," Prentic, 2005
  3. T. Abdurahmonov, Y. E. Thiam, M. H. Helmi, "Improving Smart Card Security Using Elliptic Curve Cryptography over Prime Field,"2010.
  4. T. Abdurahmonov, M. H. Helmi, Y. E. Thiam, "Personal Information Requirements of Global Information System," International Conference on Science and Social Research (CSSR 2010), Kuala Lumpur, Malaysia, 2010, pp. 1197-1202.
  5. All about Encryption in Smart Card by Maryam Savari Mohammad Montazerolzo hour
  6. Performance Comparison of Elliptic Curve and RSA by Digital Signatures by Nicholas Jansma, Brandon Arrendondo
  7. Comparison Research on Digital Signature Algorithms in Mobile Web Services by Zuguang Xuan, Zhenjun Du, Rong Chen
  8. Secure Encryption with Digital Signature Approach for Short Message Service by Narendra S. Chaudhari and Neetesh Saxena
  9. A Secure Elliptic Curve Digital Signature Scheme for Embedded Devices by Elha djyousse fwajih and Machhout Mohsen
  10. Evaluation of Security Level of Cryptography: ECDSA Signature Scheme by Alfred Menezes, Minghua Qu, Doug Stinson, Yongge Wang Certicom Research
  11. An ECDSA Signature Scheme Designsfor PBOC 2. 0 Specifications Zhang YouqiaoZhouWunengCollege of Information Science and Technology
  12. The Elliptic Curve Digital Signature Algorithm (ECDSA) Coenrt Jicoohmns Ronesea anrdch Creadna Mdeanezesand Scott Vanstone Dept. of Combinatorics & Optimization, University of Waterloo, Canada Emails: _djohnson, amenezes, svanstone_@certicom. com
  13. Introduction to Elliptic Curve Cryptography by Elisabeth Oswald
  14. ELLIPTIC CURVE CRYPTOGRAPHY: JAVA IMPLEMENTATION ISSUES V yoso Maartinez, C. Sc4nchezAvila J. Espinosa Garcia, L. Hernd'ndez Encinas
  15. ELLIPTIC CURVE CRYPTOGRAPHY:THE SERPENTINE COURSE OF A PARADIGM SHIFTANN HIBNER KOBLITZ, NEAL KOBLITZ, AND ALFRED MENEZES
  16. The Study on E-commerce Security Based on ECC and SET Xiuhua LIU
  17. ECC over RSA for Asymmetric Encryption: A Review Kamlesh Gupta1, Sanjay Silakari2 JUET, Guna, Gwalior, MP, India UIT, RGPV, Bhopal, MP, India
  18. Speeding up Secure Web Transactions Using Elliptic Curve Cryptography Vipul Gupta, Douglas Stebila_, Stephen Fung*, Sheueling Chang Shantz, Nils Gura, Hans Eberle
  19. Implementation of Dual Signature in Java Shradha Singh, Dr. Prema K. V. FET, MITS, Laxmangarh-332311(Sikar) Rajasthan
  20. An ECDSA Signature Scheme Designs for PBOC 2. 0 Specifications Zhang Youqiao Zhou Wuneng College of Information Science and Technology Donghua University, China
Index Terms

Computer Science
Information Sciences

Keywords

ECC ECDSA Dual signature SET protocol