L33-Signature Varients

L33-Signature Varients - a cryptographic hash function. 1....

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Digital Signature Varients Digital Signature Varients
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Signature Signature based authentication based authentication 1) Digital signature 2) Proxy signature 3) Multi-signature 4) Blind signature 5) …
Background image of page 2
Map Map - - to to - - Point Point a special hash function a special hash function Let E(F q ) be an elliptic curve defined by y 2 = f(x) and let F q has order m. Let P be a generator of E(F q ), h : {0, 1} * Æ F q x {0, 1} be
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: a cryptographic hash function. 1. Given M ∈ {0, 1} * , Set i = 1 2. Set (x, b) = h(i || M) ∈ F q x {0, 1} 3. If f(x) is a quadratic residue in F q then- Let±y , y 1 ∈ F q be the two square roots of f(x)- Set±P M = (x, y b ) such that y b = Max(y , y 1 ) 4. Compute P M’ = (m/p)P M . Then P M’ ∈ E(F q ). 5. Otherwise increment i and go to step 2....
View Full Document

This note was uploaded on 09/15/2010 for the course CSE IT325 taught by Professor Maniklaldas during the Spring '09 term at Punjab Engineering College.

Page1 / 3

L33-Signature Varients - a cryptographic hash function. 1....

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online