Skip to main content
Top
Published in: Wireless Personal Communications 2/2020

01-08-2020

Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography

Author: Raman Kumar

Published in: Wireless Personal Communications | Issue 2/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Financial Cryptography and Security Engineering are the significant areas for research, advanced development, education, exploration and also for commercial purposes. The paper emphasizes both essential and applied real-world deployments on all aspects as far as e-commerce security is concerned. In essence, we recognize several issues of financial cryptography and suitable technique to concentrate on them. Enhanced multi-sign signature scheme may be considered for parameters like Histogram, Diagram, Trigram and n-gram etc. Quantum Computing and TKIP delivers more comprehensive security and effective performance as compared to existing public key methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Abdalla, M., Boyen, X., Chevalier, C., & Pointcheval, D. (2009). Distributed public-key cryptography from weak secrets. In S. Jarecki & G. Tsudik (Eds.), PKC 2009. LNCS (Vol. 5443, pp. 139–159). Heidelberg: Springer. Abdalla, M., Boyen, X., Chevalier, C., & Pointcheval, D. (2009). Distributed public-key cryptography from weak secrets. In S. Jarecki & G. Tsudik (Eds.), PKC 2009. LNCS (Vol. 5443, pp. 139–159). Heidelberg: Springer.
5.
go back to reference Nimbhorkar, S., & Malik, L. (2016). Comparative analysis of authenticated key agreement protocols based on elliptic curve cryptography. Procedia Computer Science, 78, 824–830. Nimbhorkar, S., & Malik, L. (2016). Comparative analysis of authenticated key agreement protocols based on elliptic curve cryptography. Procedia Computer Science, 78, 824–830.
8.
go back to reference Luu, L., Saha, R., Parameshwaran, I., Saxena, P., & Hobor, A. (2015). On power splitting games in distributed computation: The case of bitcoin pooled mining. Technical report, Cryptology ePrint Archive, Report 2015/155. http://eprint.iacr.org. Luu, L., Saha, R., Parameshwaran, I., Saxena, P., & Hobor, A. (2015). On power splitting games in distributed computation: The case of bitcoin pooled mining. Technical report, Cryptology ePrint Archive, Report 2015/155. http://​eprint.​iacr.​org.
9.
go back to reference Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. (2015). Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. (2015). Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy.
10.
go back to reference Lambert, M., Ferrari, S., & Wajert, B. (2013). Costs and benefits of replacing the $1 Federal Reserve Note with a $1 U.S. coin. Federal Reserve Working Paper. Retrieved January 10, 2014. Lambert, M., Ferrari, S., & Wajert, B. (2013). Costs and benefits of replacing the $1 Federal Reserve Note with a $1 U.S. coin. Federal Reserve Working Paper. Retrieved January 10, 2014.
11.
go back to reference Kumar, R., Verma, H. K., Dhir, R. (2015). Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers. Wireless Personal Communications – An International Journal, 80(3), 1281–1345. ISSN 0929-6212 (Print) 1572-834X (Online). Kumar, R., Verma, H. K., Dhir, R. (2015). Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers. Wireless Personal Communications – An International Journal, 80(3), 1281–1345. ISSN 0929-6212 (Print) 1572-834X (Online).
12.
go back to reference Kumar, R. (2018). Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers. Knowledge Computing and Its Applications. ISBN 978-981-10-6679-5. Kumar, R. (2018). Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers. Knowledge Computing and Its Applications. ISBN 978-981-10-6679-5.
13.
go back to reference Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetMATH Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetMATH
14.
go back to reference ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions of Information Theory, 31(4), 469–472.MathSciNetMATH ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions of Information Theory, 31(4), 469–472.MathSciNetMATH
15.
go back to reference Miller, V. S. (1985). Uses of elliptic curves in cryptography. In Advances in cryptology—Crypo’85. LNCS (Vol. 218, pp. 417–426). Miller, V. S. (1985). Uses of elliptic curves in cryptography. In Advances in cryptology—Crypo’85. LNCS (Vol. 218, pp. 417–426).
16.
go back to reference Gu, K., et al. (2020). Reusable mesh signature scheme for protecting identity privacy of IoT devices. Sensors (Basel), 20, 758. Gu, K., et al. (2020). Reusable mesh signature scheme for protecting identity privacy of IoT devices. Sensors (Basel), 20, 758.
17.
go back to reference Lee, K., & Lee, D. H. (2015). Security analysis of the unrestricted identity-based aggregate signature scheme. PLoS ONE, 10, e0128081. Lee, K., & Lee, D. H. (2015). Security analysis of the unrestricted identity-based aggregate signature scheme. PLoS ONE, 10, e0128081.
18.
go back to reference Shu, H., et al. (2020). An efficient certificateless aggregate signature scheme for blockchain-based medical cyber physical systems. Sensors (Basel), 20, 1521. Shu, H., et al. (2020). An efficient certificateless aggregate signature scheme for blockchain-based medical cyber physical systems. Sensors (Basel), 20, 1521.
19.
go back to reference Tu, H., et al. (2014). Reattack of a certificateless aggregate signature scheme with constant pairing computations. Scientific World Journal, 2014, 343715. Tu, H., et al. (2014). Reattack of a certificateless aggregate signature scheme with constant pairing computations. Scientific World Journal, 2014, 343715.
20.
go back to reference Xiao, J., et al. (2018). SigMat: A classification scheme for gene signature matching. Bioinformatics, 34, i547–i554. Xiao, J., et al. (2018). SigMat: A classification scheme for gene signature matching. Bioinformatics, 34, i547–i554.
21.
go back to reference Yang, X., et al. (2019). A strongly unforgeable certificateless signature scheme and its application in IoT environments. Sensors (Basel), 19, 2692. Yang, X., et al. (2019). A strongly unforgeable certificateless signature scheme and its application in IoT environments. Sensors (Basel), 19, 2692.
22.
go back to reference Yeh, K. H., et al. (2017). A novel certificateless signature scheme for smart objects in the Internet-of-Things. Sensors (Basel), 17, 1001. Yeh, K. H., et al. (2017). A novel certificateless signature scheme for smart objects in the Internet-of-Things. Sensors (Basel), 17, 1001.
23.
go back to reference Yuan, E., et al. (2020). A key management scheme based on pairing-free identity based digital signature algorithm for heterogeneous wireless sensor networks. Sensors (Basel), 20, 1543. Yuan, E., et al. (2020). A key management scheme based on pairing-free identity based digital signature algorithm for heterogeneous wireless sensor networks. Sensors (Basel), 20, 1543.
Metadata
Title
Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography
Author
Raman Kumar
Publication date
01-08-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07642-2

Other articles of this Issue 2/2020

Wireless Personal Communications 2/2020 Go to the issue