Abstract
Digital signature authentication scheme provides secure communication between users. Digital signatures guarantee message integrity and authentication information about the origin of a message. In the present paper we describe existing algorithms for the formation and verification of the digital signature. The conducted studies made it possible to determine that the schemes with message recovery differ from the schemes with the addition that they do not completely hash messages, but instead use masking functions and redundancy of the message. It was determined that the most effective and optimal for further use is the Nyrberg-Rueppel scheme, which is based on elliptical curves (ECNR). In this paper, we present a new digital signature scheme with message recovery based on elliptic curve cryptograph on the base of the State standart 4145-2002. Elliptic curve cryptosystem provides greater security compared to integer factorization system and discrete logarithm system, for any given key size and bandwidth. The main difference between the proposed scheme was the replacement of the hash function with the hash token function, which makes the signature and verification procedure reversed and allows you to recove messages from the signature r-component.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
ISO/IEC: ISO/IEC 9796-3:2006, Information technology – Security techniques – Digital signature schemes giving message recovery – Part 3: Discrete logarithm based mechanisms (2006)
ISO/IEC: ISO/IEC 15946-4, Information technology – Security techniques – Cryptographic techniques based on elliptic curves – Part 4: Digital signatures giving message recovery (2001)
The state standard of Ukraine 4145-2002, Information Technology – Cryptographic protection of information – Digital signature based on elliptical curves. Formation and verification (2002). (in Ukrainian)
Law of Ukraine: About electronic documents and electronic document circulation (2003). (in Ukrainian)
Law of Ukraine: On electronic digital signature (2003). (in Ukrainian)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1987)
Miyaji, A.: Another countermeasure to forgeries over message recovery signature. IEICE Trans. Fundam. E80-A(11), 2192–2200 (1997)
Shevchuk, O.A.: Particulars of digital signatures with message recovery. Appl. Radio Electron. 9(3), 489–492 (2010). (in Ukrainian)
Alguliev, R.M., Imamverdiev, Ya.N.: Study of international and national standards for digital signatures on elliptic curves. Secur. Inf. 2(69), 2–7 (2005). (in Russian)
Moldovyan, D.N.: New signature generation mechanism in EDS schemes based on the complexity of discrete logarithmization and factorization. Secur. Inf. 4(71), 81–93 (2005). (in Russian)
Gorbenko, Yu.I, Shevchuk, A.A.: Analysis of authorities and areas of digital signatures to the standard ISO. Appl. Radio Electron. 8(3), 304–314 (2009). (in Ukrainian)
Ilyenko, A.V.: Evaluating the effectiveness of the optimized cryptographic system Gentry of conditions for ensure the confidentiality of information. Sci.-Based Technol. 1(33), 41–45 (2017). (in Ukrainian)
Ilyenko, A.V.: Modern ways of improving the procedure for the formation and verification of digital signature. Sci.-Based Technol. 1(37), 61–66 (2018). (in Ukrainian)
Ilyenko, A.V., Ilyenko, S.S.: Program module using the procedure for the formation and verification of electronic digital signature. Sci.-Based Technol. 3(39), 345–354 (2018). (in Ukrainian)
Alimoradi, R.: A study of hyperelliptic curves in cryptography. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(8), 67–72 (2016). https://doi.org/10.5815/ijcnis.2016.08.08
Goyal, R., Khurana, M.: Cryptographic security using various encryption and decryption method. Int. J. Math. Sci. Comput. (IJMSC) 3(3), 1–11 (2017). https://doi.org/10.5815/ijmsc.2017.03.01
Kamboj, D., Gupta, D.K., Kumar, A.: Efficient scalar multiplication over elliptic curve. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(4), 56–61 (2016). https://doi.org/10.5815/ijcnis.2016.04.07
Agarkhed, J., Ashalatha, R.: Security and privacy for data storage service scheme in cloud computing. Int. J. Inf. Eng. Electron. Bus. (IJIEEB) 9(4), 7–12 (2017). https://doi.org/10.5815/ijieeb.2017.04.02
Nyberg, K., Rueppel, R.A.: Message recovery for signature schemes based on the discrete logarithm problem. In: De Santis, A. (ed.) Advances in Cryptology-EUROCRYPT’94, LNCS, vol. 950, pp. 175–190. Springer, Verlag (1995)
Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, London (1996)
Schneier, B.: Applied Cryptography, 2nd edn. Wiley, Hoboken (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kazmirchuk, S., Anna, I., Sergii, I. (2020). Digital Signature Authentication Scheme with Message Recovery Based on the Use of Elliptic Curves. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol 938. Springer, Cham. https://doi.org/10.1007/978-3-030-16621-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-16621-2_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16620-5
Online ISBN: 978-3-030-16621-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)