Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Comparative Analysis of Signature Schemes in a New Approach to Variant on ECDSA


Affiliations
1 Computer Science and Engineering Department, Adhiyamaan College of Engineering, Hosur, Anna University, Coimbatore, Tamil Nadu, India
2 Government College of Technology, Coimbatore, Tamil Nadu, India
     

   Subscribe/Renew Journal


To date, most of the signature schemes are based on Elliptic curves. The Elliptic curve based on signature scheme is called as ECDSA.In support of this scheme a study on a number of schemes was done. We also extend this signature schemes to a Variant Scheme level of ECDSA.In this paper, we propose a new variant ECDSA scheme that will produce the high level of security with the help of the parameters. We give a brief preamble to the signature scheme in chapter I and the give a comparative result in the chapter XI. Finally, we show that the proposed variant ECDSA satisfy every security levels on the signature schemes.


Keywords

DSA, ECDSA, Lamport, Schnorr, Signature Scheme.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 406

PDF Views: 2




  • A Comparative Analysis of Signature Schemes in a New Approach to Variant on ECDSA

Abstract Views: 406  |  PDF Views: 2

Authors

M. Prabu
Computer Science and Engineering Department, Adhiyamaan College of Engineering, Hosur, Anna University, Coimbatore, Tamil Nadu, India
R. Shanmugalakshmi
Government College of Technology, Coimbatore, Tamil Nadu, India

Abstract


To date, most of the signature schemes are based on Elliptic curves. The Elliptic curve based on signature scheme is called as ECDSA.In support of this scheme a study on a number of schemes was done. We also extend this signature schemes to a Variant Scheme level of ECDSA.In this paper, we propose a new variant ECDSA scheme that will produce the high level of security with the help of the parameters. We give a brief preamble to the signature scheme in chapter I and the give a comparative result in the chapter XI. Finally, we show that the proposed variant ECDSA satisfy every security levels on the signature schemes.


Keywords


DSA, ECDSA, Lamport, Schnorr, Signature Scheme.