Design of identity-based digital signature schemes using extended chaotic maps
نویسنده
چکیده
Inspired from the Identity-based cryptosystem proposed by Adi Shamir, and Boneh and Franklin, this paper designed a new Identity-based digital signature (ECM-IDS) scheme using extended chaotic maps. The ECM-IDS scheme is secure based on the difficulties of integer factorization problem.
منابع مشابه
Identity-based encryption and digital signature schemes using extended chaotic maps
This paper designed a new extended chaotic map-based Identity-based encryption (ECM-IBE) scheme and Identitybased digital signature (ECM-IDS) scheme using extended chaotic maps. The security of the ECM-IBE scheme is based on the hardness assumption of chaotic maps-based decisional DiffieHellman (CDDH) problem, whereas the ECM-IDS scheme is secure based on the difficulties of chaotic maps-based ...
متن کاملAn Improved Online/Offline Identity-Based Signature Scheme for WSNs
Online/offline signature schemes allow the signer to generate an online signature in real-time from a precomputed offline signature when presented with a document. Such schemes are particularly useful in resource-constrained wireless sensor network applications. In this paper, we describe an identity-based online/offline signature scheme based on bilinear maps, and prove the security of the sch...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملLatency Compensation in Multi Chaotic Systems Using the Extended OGY Control Method
The problem discussed in this paper is the effect of latency time on the OGY chaos control methodology in multi chaotic systems. The Smith predictor, rhythmic and memory strategies are embedded in the OGY chaos control method to encounter loop latency. A comparison study is provided and the advantages of the Smith predictor approach are clearly evident from the closed loop responses. The comple...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014