Implementation of Dual Signature in Java

نویسنده

  • Shradha Singh
چکیده

The Secure Electronic Transaction (SET) protocol has been proposed by a consortium of credit card companies and software corporations to guarantee the authenticity of e-commerce transactions and the confidentiality of data. When the customer makes a purchase, the SET dual signature keeps his account details secret from the merchant and his choice of goods secret from the bank. This paper describes Java implementation of a Dual Signature and then illustrates the working of signature with the help of GUI made in Java Net Beans 7.0. Keywords—Algorithms, Dual Signature, Message Digest, RSA, Security, SET.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Digital identity-based multisignature scheme implementation

Digital signature, as an official signature, have many applications in information security, including authentication, data integrity, and non-repudiation. When a private or public document must be signed by a group of people, we call it multisignature scheme if all and every single member of the group signs the document. An identity-based digital multisignature is a multi signer digital signat...

متن کامل

Implementation of KCDSA Algorithm Based on Java Card

The security and portability of Java cards provide a safe, reliable, convenient, and effective way to ensure secure e-business and to enable a broad range of new application. But. Java cards represents one of the smallest computing platforms in use today. That is, a major factor influencing the design and implementation of Java Card is the limited availability of computing resources. Thus, In t...

متن کامل

A Java Implementation of a Multisignature Scheme

Multisignature protocols are digital signature schemes that allow a group of users to sign a message so that the signature thus produced is valid only if all the members of the group participate in the signature process. In general, these schemes need the collaboration of a Trusted Third Party, which computes and securely stores some of the parameters associated to the scheme. In this work, we ...

متن کامل

A Java Implementation of the Elliptic Curve Integrated Encryption Scheme

Elliptic Curve Cryptography (ECC) is a branch of Cryptography that can be used for encrypting data, generating digital signatures or exchanging keying material during the initial phases of a secure communication. Regarding encryption, the best-known scheme based on ECC is the Elliptic Curve Integrated Encryption Scheme (ECIES). A Java implementation of ECIES is presented in this paper, showing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012