Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "b06b1ea5-1f90-4247-a21a-ddc109a3a339"}, "_deposit": {"id": "4660", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4660"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4660", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Comparison of Elliptic Curve Key Size in Proposed Blind Signature", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Privacy is one of the basic rights forindividuals and institutions that need to preservetheir confidentiality. Blind signature is widelyused for various applications of e-commerce likedigital payment system and electronic votingsystem where to maintain the privacy ofcustomer is necessary. Most of the blindsignature schemes are very high atcomputational overhead and memory usageproblem. And then they need to maintain thesecurity of blind signature scheme to protect thedata. In this paper, four scalar multiplicationmethods are run in efficient blind signaturescheme by varying the NIST key size. By savingrandom factors and key size with suitable bitsthe system solved the memory usage problem.This paper showed that the comparison of keysize with other blind signatures schemes andanalyzed the security of proposed scheme.Compare with previous schemes, proposed blindsignature with 160 bit ECC is more efficient andlow computation and it can be applied in Evotingsystem."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "BDS"}, {"interim": "DLP"}, {"interim": "ECC"}, {"interim": "NIST"}, {"interim": "ECDLP"}, {"interim": "ECM"}, {"interim": "PKC"}, {"interim": "E-voting"}, {"interim": "E-cash"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "201641.pdf", "filesize": [{"value": "152 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 152000.0, "url": {"url": "https://meral.edu.mm/record/4660/files/201641.pdf"}, "version_id": "eda6aeb9-4fa0-40b9-b986-2f0f53883c5d"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thu, Aye Aye"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/313"}, "item_title": "Comparison of Elliptic Curve Key Size in Proposed Blind Signature", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004660", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4660", "relation": {}, "relation_version_is_last": true, "title": ["Comparison of Elliptic Curve Key Size in Proposed Blind Signature"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Comparison of Elliptic Curve Key Size in Proposed Blind Signature

http://hdl.handle.net/20.500.12678/0000004660
http://hdl.handle.net/20.500.12678/0000004660
6421765f-5464-4652-9ff8-308cf73e22e8
b06b1ea5-1f90-4247-a21a-ddc109a3a339
None
Preview
Name / File License Actions
201641.pdf 201641.pdf (152 Kb)
Publication type
Article
Upload type
Publication
Title
Title Comparison of Elliptic Curve Key Size in Proposed Blind Signature
Language en
Publication date 2016-02-25
Authors
Thu, Aye Aye
Mya, Khin Than
Description
Privacy is one of the basic rights forindividuals and institutions that need to preservetheir confidentiality. Blind signature is widelyused for various applications of e-commerce likedigital payment system and electronic votingsystem where to maintain the privacy ofcustomer is necessary. Most of the blindsignature schemes are very high atcomputational overhead and memory usageproblem. And then they need to maintain thesecurity of blind signature scheme to protect thedata. In this paper, four scalar multiplicationmethods are run in efficient blind signaturescheme by varying the NIST key size. By savingrandom factors and key size with suitable bitsthe system solved the memory usage problem.This paper showed that the comparison of keysize with other blind signatures schemes andanalyzed the security of proposed scheme.Compare with previous schemes, proposed blindsignature with 160 bit ECC is more efficient andlow computation and it can be applied in Evotingsystem.
Keywords
BDS, DLP, ECC, NIST, ECDLP, ECM, PKC, E-voting, E-cash
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/313
Journal articles
Fourteenth International Conference On Computer Applications (ICCA 2016)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:14:44.068247
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL