Skip to main content
Erschienen in: Wireless Personal Communications 2/2020

01.08.2020

Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography

verfasst von: Raman Kumar

Erschienen in: Wireless Personal Communications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Financial Cryptography and Security Engineering are the significant areas for research, advanced development, education, exploration and also for commercial purposes. The paper emphasizes both essential and applied real-world deployments on all aspects as far as e-commerce security is concerned. In essence, we recognize several issues of financial cryptography and suitable technique to concentrate on them. Enhanced multi-sign signature scheme may be considered for parameters like Histogram, Diagram, Trigram and n-gram etc. Quantum Computing and TKIP delivers more comprehensive security and effective performance as compared to existing public key methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Abdalla, M., Boyen, X., Chevalier, C., & Pointcheval, D. (2009). Distributed public-key cryptography from weak secrets. In S. Jarecki & G. Tsudik (Eds.), PKC 2009. LNCS (Vol. 5443, pp. 139–159). Heidelberg: Springer. Abdalla, M., Boyen, X., Chevalier, C., & Pointcheval, D. (2009). Distributed public-key cryptography from weak secrets. In S. Jarecki & G. Tsudik (Eds.), PKC 2009. LNCS (Vol. 5443, pp. 139–159). Heidelberg: Springer.
5.
Zurück zum Zitat Nimbhorkar, S., & Malik, L. (2016). Comparative analysis of authenticated key agreement protocols based on elliptic curve cryptography. Procedia Computer Science, 78, 824–830. Nimbhorkar, S., & Malik, L. (2016). Comparative analysis of authenticated key agreement protocols based on elliptic curve cryptography. Procedia Computer Science, 78, 824–830.
8.
Zurück zum Zitat Luu, L., Saha, R., Parameshwaran, I., Saxena, P., & Hobor, A. (2015). On power splitting games in distributed computation: The case of bitcoin pooled mining. Technical report, Cryptology ePrint Archive, Report 2015/155. http://eprint.iacr.org. Luu, L., Saha, R., Parameshwaran, I., Saxena, P., & Hobor, A. (2015). On power splitting games in distributed computation: The case of bitcoin pooled mining. Technical report, Cryptology ePrint Archive, Report 2015/155. http://​eprint.​iacr.​org.
9.
Zurück zum Zitat Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. (2015). Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. (2015). Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy.
10.
Zurück zum Zitat Lambert, M., Ferrari, S., & Wajert, B. (2013). Costs and benefits of replacing the $1 Federal Reserve Note with a $1 U.S. coin. Federal Reserve Working Paper. Retrieved January 10, 2014. Lambert, M., Ferrari, S., & Wajert, B. (2013). Costs and benefits of replacing the $1 Federal Reserve Note with a $1 U.S. coin. Federal Reserve Working Paper. Retrieved January 10, 2014.
11.
Zurück zum Zitat Kumar, R., Verma, H. K., Dhir, R. (2015). Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers. Wireless Personal Communications – An International Journal, 80(3), 1281–1345. ISSN 0929-6212 (Print) 1572-834X (Online). Kumar, R., Verma, H. K., Dhir, R. (2015). Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers. Wireless Personal Communications – An International Journal, 80(3), 1281–1345. ISSN 0929-6212 (Print) 1572-834X (Online).
12.
Zurück zum Zitat Kumar, R. (2018). Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers. Knowledge Computing and Its Applications. ISBN 978-981-10-6679-5. Kumar, R. (2018). Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers. Knowledge Computing and Its Applications. ISBN 978-981-10-6679-5.
13.
Zurück zum Zitat Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetMATH Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetMATH
14.
Zurück zum Zitat ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions of Information Theory, 31(4), 469–472.MathSciNetMATH ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions of Information Theory, 31(4), 469–472.MathSciNetMATH
15.
Zurück zum Zitat Miller, V. S. (1985). Uses of elliptic curves in cryptography. In Advances in cryptology—Crypo’85. LNCS (Vol. 218, pp. 417–426). Miller, V. S. (1985). Uses of elliptic curves in cryptography. In Advances in cryptology—Crypo’85. LNCS (Vol. 218, pp. 417–426).
16.
Zurück zum Zitat Gu, K., et al. (2020). Reusable mesh signature scheme for protecting identity privacy of IoT devices. Sensors (Basel), 20, 758. Gu, K., et al. (2020). Reusable mesh signature scheme for protecting identity privacy of IoT devices. Sensors (Basel), 20, 758.
17.
Zurück zum Zitat Lee, K., & Lee, D. H. (2015). Security analysis of the unrestricted identity-based aggregate signature scheme. PLoS ONE, 10, e0128081. Lee, K., & Lee, D. H. (2015). Security analysis of the unrestricted identity-based aggregate signature scheme. PLoS ONE, 10, e0128081.
18.
Zurück zum Zitat Shu, H., et al. (2020). An efficient certificateless aggregate signature scheme for blockchain-based medical cyber physical systems. Sensors (Basel), 20, 1521. Shu, H., et al. (2020). An efficient certificateless aggregate signature scheme for blockchain-based medical cyber physical systems. Sensors (Basel), 20, 1521.
19.
Zurück zum Zitat Tu, H., et al. (2014). Reattack of a certificateless aggregate signature scheme with constant pairing computations. Scientific World Journal, 2014, 343715. Tu, H., et al. (2014). Reattack of a certificateless aggregate signature scheme with constant pairing computations. Scientific World Journal, 2014, 343715.
20.
Zurück zum Zitat Xiao, J., et al. (2018). SigMat: A classification scheme for gene signature matching. Bioinformatics, 34, i547–i554. Xiao, J., et al. (2018). SigMat: A classification scheme for gene signature matching. Bioinformatics, 34, i547–i554.
21.
Zurück zum Zitat Yang, X., et al. (2019). A strongly unforgeable certificateless signature scheme and its application in IoT environments. Sensors (Basel), 19, 2692. Yang, X., et al. (2019). A strongly unforgeable certificateless signature scheme and its application in IoT environments. Sensors (Basel), 19, 2692.
22.
Zurück zum Zitat Yeh, K. H., et al. (2017). A novel certificateless signature scheme for smart objects in the Internet-of-Things. Sensors (Basel), 17, 1001. Yeh, K. H., et al. (2017). A novel certificateless signature scheme for smart objects in the Internet-of-Things. Sensors (Basel), 17, 1001.
23.
Zurück zum Zitat Yuan, E., et al. (2020). A key management scheme based on pairing-free identity based digital signature algorithm for heterogeneous wireless sensor networks. Sensors (Basel), 20, 1543. Yuan, E., et al. (2020). A key management scheme based on pairing-free identity based digital signature algorithm for heterogeneous wireless sensor networks. Sensors (Basel), 20, 1543.
Metadaten
Titel
Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography
verfasst von
Raman Kumar
Publikationsdatum
01.08.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07642-2

Weitere Artikel der Ausgabe 2/2020

Wireless Personal Communications 2/2020 Zur Ausgabe

Neuer Inhalt