Shankar et al., 2023 - Google Patents
Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithmShankar et al., 2023
View PDF- Document ID
- 7267121063398359066
- Author
- Shankar G
- Ai-Farhani L
- Anitha Christy Angelin P
- Singh P
- Alqahtani A
- Singh A
- Kaur G
- Samori I
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
At the moment, digital documents are just as important as paper documents. As a result, authenticity is essential, especially in legal situations and digital forensics. As technology advances, these digital signature algorithms become weaker, necessitating the …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7522723B1 (en) | Password self encryption method and system and encryption by keys generated from personal secret information | |
| Shankar et al. | Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithm | |
| CN107733648B (en) | An identity-based RSA digital signature generation method and system | |
| US9800418B2 (en) | Signature protocol | |
| Liu et al. | Server-aided anonymous attribute-based authentication in cloud computing | |
| Tanwar et al. | Efficient and secure multiple digital signature to prevent forgery based on ECC | |
| CN103988466A (en) | Group encryption method and device | |
| Jing | An efficient homomorphic aggregate signature scheme based on lattice | |
| EP4423961A1 (en) | Generating shared keys | |
| CN112380579A (en) | Lattice-based forward security certificateless digital signature scheme | |
| US20150006900A1 (en) | Signature protocol | |
| CN111245615B (en) | An Identity-Based Digital Signature Password Reverse Firewall Method | |
| Feng et al. | White-box implementation of Shamir’s identity-based signature scheme | |
| Tsai et al. | Multi‐document threshold signcryption scheme | |
| Chande et al. | An improvement of a elliptic curve digital signature algorithm | |
| Kumar et al. | Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers | |
| Xin et al. | Identity-based quantum signature based on Bell states | |
| Chung et al. | Ring signature scheme for ECC-based anonymous signcryption | |
| Song et al. | Attribute-based signcryption scheme based on linear codes | |
| WO2016187689A1 (en) | Signature protocol | |
| Prasad et al. | Digital signatures | |
| Lin et al. | F2P‐ABS: A Fast and Secure Attribute‐Based Signature for Mobile Platforms | |
| Wu et al. | A publicly verifiable PCAE scheme for confidential applications with proxy delegation | |
| Wang | Signer‐admissible strong designated verifier signature from bilinear pairings | |
| Téllez et al. | Security in mobile payment systems |