Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: A New Forward-Secure Digital Signature Scheme
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
[attachment=5307]
This article is presented by:
HONG Jingxin
Communication Engineering Department of Xiamen University

A New Forward-Secure Digital Signature Scheme
ABSTRACT
In this paper, the widely used ECC digital signature scheme – ECDSA is advanced, and a new forward-secure digital signature scheme is proposed in order to reform the limitations of ECDSA. In the new scheme, although the digital signature’s private key is under the control of a one-way function and continually changed in different durations with time goes by, its public key remains the same. The attacker could not fake the older signature even if the private key is leaked out in some period of time. In this way this scheme makes sure of the security of signature of former phases. The validity of the new scheme is proved and the security is analyzed in the paper.
INTRODUCTION
The widely used public key digital signature scheme is designed on the NP problem in mathematics. The ECC Digital Signature constructs discrete logarithm problem by using the Abel additive group composed of the points on elliptic curve. With the development of the computer sciences and the communication business, digital signature becomes one of the most important means to guarantee the security of communication.But in reality, the signature private key may be leaked out through the secret leaks of system or factitious factors, so the signature may be faked, which become a difficult part of security problem. This article based on non-supersingular elliptic curve over finite field (2 ) n GF with eigenvalue n 2, advances a kind of forward-secure digital signature scheme.



i need mathematical proof for this project.
Hi,
in the pdf posted along with the report, under the section THE NEW SCHEME’S PROVABLE SECURITY ANALYSIS , the validity of the scheme is proved. You can refer to that.