Proposed Developments of Elliptic Curve Digital Signature Algorithm

The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of DSA, where it is a digital signature scheme designed to provide a digital signature based on a secret number known only to the signer and also on the actual message being signed. These digital signatures are considered the digital counterparts to handwritten signatures, and are the basis for validating the authenticity of a connection. The security of these schemes results from the infeasibility to compute the signature without the private key. In this paper we introduce a proposed to development the original ECDSA with more complexity.




References:
[1] D. Johnson, A. Menezes, "The elliptic curve digital signature algorithm
(ECDSA)", Center of Applied Cryptographic Research, University of
Waterloo, Technical Report CORR99-34,1999.
[2] FibiÛkova, L., "Elliptic Curve Cryptography over Prime Fields",
University of Essen, Germany, (2002).
[3] Jian-zhu Lu, Huo-yan Chen, "New message recovery signature schemes
and its security", Mini-Micro Systems 24 (4) (2003) 695-697.
[4] Jurisic, A. and Menezes, A., "Elliptic Curves and Cryptography".
[5] N. Koblitz, "Elliptic curve cryptosystems", Mathematics of
Computation 48 (1987) 203-209.
[6] Oswald, E., "Introduction to Elliptic Curve Cryptography", Institute for
Applied Information Processing and Communication, Graz University
Technology, (2002).
[7] S.J. Hwang, C.C. Chang, W.P. Yang, "Authenticated encryption
schemes with message linkages", Information Processing Letters 58
(1996) 189-194.
[8] V. Miller, "Use of elliptic curves in cryptography, in: Advances in
cryptology", CRYPTO 85,Lecture Notes in Computer Science, vol. 218,
Springer-Verlag, 1986, pp. 417-426.
[9] W.B. Lee, C.C. Chang, "Authenticated encryption schemes with linkage
between message blocks", Information Processing Letters 63 (1997)
247-250.
[10] Y.M. Tseng, J.K. Jan, "An efficient authenticated
encryption schemes with message linkages and low communication
costs", Journal of Information and Engineering 18 (2002) 41-46.
[11] Zhi-chen Li, Yi-xian Yang, "New message recovery signature scheme",
Acta Electronic Sinica 28 (1) (2000) 125-126.
[12] Zhi-chen Li, Zhong-xian Li, Yi-xian Yang, "A new forgery attack on
message recovery signatures", Journal of China Institute of
Communications 21 (5) (2000) 84-87.