Table of Contents
ISRN Communications and Networking
Volume 2011 (2011), Article ID 231649, 3 pages
http://dx.doi.org/10.5402/2011/231649
Research Article

A New Signature Scheme Based on Multiple Hard Number Theoretic Problems

1School of Mathematical Sciences, Faculty of Science and Techology, National University of Malaysia, 43600 Bangi, Selangor, Malaysia
2Department of Mathematics, Faculty of Sciences, The Hashemite University, Zarqa 13133, Jordan

Received 23 March 2011; Accepted 4 May 2011

Academic Editor: R. Pérez Jiménez

Copyright © 2011 E. S. Ismail and N. M. F. Tahat. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. W. Diffie and M. E. Hellman, “New direction in cryptography,” IEEE Transaction on Information Networking and Application, pp. 557–560, 1975. View at Publisher · View at Google Scholar
  2. T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transaction on Information Theory, vol. IT-31, no. 4, pp. 469–472, 1985. View at Google Scholar
  3. R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signature and public-key cryptosystem,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at Scopus
  4. W. He, “Digital signature scheme based on factoring and discrete logarithms,” Electronics Letters, vol. 37, no. 4, pp. 220–222, 2001. View at Google Scholar · View at Scopus
  5. C. S. Laih and W. C. Kuo, “New signature scheme based on factoring and discrete logarithms,” IEICE Transactions on Fundamentals on Cryptography and Information Security, vol. 80, no. 1, pp. 46–53, 1997. View at Google Scholar
  6. N. Y. Lee and T. Hwang, “Modified Harn signature scheme based on factorising and discrete logarithms,” IEE Proceedings-Computers and Digital Techniques, vol. 143, no. 3, pp. 196–198, 1996. View at Google Scholar · View at Scopus
  7. Z. Shao, “Digital signature schemes based on factoring and discrete logarithms,” Electronics Letters, vol. 38, no. 24, pp. 1518–1519, 2002. View at Publisher · View at Google Scholar · View at Scopus
  8. Z. Shao, “Signature schemes based on factoring and discrete logarithms,” IEE Proceedings Computers and Digital Techniques, vol. 142, no. 5, pp. 370–372, 1998. View at Google Scholar · View at Scopus
  9. C. T. Wang and C. C. Chang, “Signature scheme based on two hard problems simultaneously,” in Proceedings of the 17th International Conference on Advanced Information Networking and Application (AINA '03), pp. 557–560, Xi'an, China, March 2003.
  10. M. S. Hwang, C. C. Yang, and S. F. Tzeng, “Improved digital signature scheme based on factoring and discrete logarithms,” Journal of Discrete Mathematical Sciences Cryptography, vol. 5, no. 2, pp. 152–155, 2002. View at Google Scholar
  11. L.-H. Li, S. F. Tzeng, and M. S. Hwang, “Improvement of signature scheme based on factoring and discrete logarithms,” Applied Mathematics and Computation, vol. 161, no. 1, pp. 49–54, 2005. View at Publisher · View at Google Scholar · View at Scopus
  12. H. Qian, Z. Cao, and H. Bao, “Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms,” Applied Mathematics and Computation, vol. 166, no. 3, pp. 501–505, 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. L. Harn, “Group-oriented (t, n) threshold digital signature scheme and digital multisignature,” IEE Proceedings: Computers and Digital Techniques, vol. 141, no. 5, pp. 307–313, 1994. View at Publisher · View at Google Scholar · View at Scopus
  14. N. Koblitz, A. Menezes, and S. Vanstone, “The state of elliptic curve cryptography,” Designs, Codes, and Cryptography, vol. 19, no. 2-3, pp. 173–193, 2000. View at Google Scholar · View at Scopus