Professional Documents
Culture Documents
New Approach of User Authentication Using Digital Signature: Rashi Dhagat Purvi Joshi
New Approach of User Authentication Using Digital Signature: Rashi Dhagat Purvi Joshi
Purvi Joshi
Information Technology
S.D. Bansal College of Technology
Indore, India
rashidhagat24@gmail.com
Information Technology
S.D. Bansal College of Technology
Indore, India
purvijoshipj@gmail.com
I.
Security;
Authentication;
INTRODUCTION
RELATED WORK
A. Notation used
x M : Original Signer
x P : Proxy Signer
x g : an element of order b in Z*a
x h(.) : a hash function
x mW : the warrant issued by original signer M
x SM : key for proxy signer P, generated by original
signer M
x X : key used by P for signing the message
x I : an integer in Z*b
x YM : original signers known key
x YP : proxy signers secret key
x k : an integer in Z*b
x n : an integer in Z*b
x s : key generated by delegator for the proxy
x t : hashed value
B. Key generation phase
In this generation phases, the signer generates its private
and public and parameters which is then send to the another
signer known as proxy to sign the document.
1) Private Key of Original Signer: An original signer M
generates its public key yM which is computed as followed
YM = gXM (mod a). Where, XM is chosen private key,
XMRZ*b.
2) Proxy delegation phase: After generating all the
necessary parameters, the original signer M communicates
(mw; r; SM) to proxy signer P in a secured manner.Where,
n=g k (mod a) ; SM = XM h(mw; n; k) (mod b) .
3) Proxy key verification: The proxy signer checks that
gSA= YM h(mw, n, k) (mod b).If this condition doesnt satisfy,
then proxy signer refuses this delegation.
2)
RESEARCH DESIGN
C. Signing Phase
In the signing phase, after receiving parameters the proxy
signer checks the parameter and if it satisfied, he generates the
proxy signature key. And then signs the message.
C. Proposed Algorithm
1) Original Signer M choose its private key xM R Z*q and
publishes its public key YM=gXM (mod a).
A. Future Scope
The exact timing of delegation certificate is unable to state
when sign of document is created. No verifier can ensure the
date and time when the document is signed.
B. Limitations
The limitation is that there is no algorithm if the signer
wants to terminate its signing ability before delegation period.
Delegation only ends after the delegated time period.
VI.
CONCLUSION
[3]
[4]
[5]
[6]