Design and implementation of secured file delivery protocol using enhanced elliptic curve cryptography for class I and class II transactions
Abstract
Keywords
Full Text:
PDFReferences
1. Chauhan SS, Jain N, Pandey SC. Digital signature with message security process. In: Proceedings of the 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE); 28–29 April 2022; Greater Noida, India. pp. 182–187.
2. Genç Y, Afacan E. Design and implementation of an efficient elliptic curve digital signature algorithm (ECDSA). In: Proceedings of the 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS); 21–24 April 2021; Toronto, Canada. pp. 1–6.
3. Mehibel N, Hamadouche M. A new enhancement of elliptic curve digital signature algorithm. Journal of Discrete Mathematical Sciences and Cryptography 2020; 23(3): 743–757. doi: 10.1080/09720529.2019.1615673
4. Federal Information Processing Standard publication #180-1. Secure Hash Standard. National Institute of Standards and Technology; 1995. p. 310.
5. Federal Information Processing Standards publication #186-2. Digital Signature Standard (DSS). National Institute of Standards and Technology; 2000. pp. 309–312.
6. Recommendations Regarding Federal Information Processing Standard (FIPS) #186-2. Digital Signature Standard (DSS). National Institute of Standards and Technology; 2001. p. 311.
7. Chen L, Moody D, Regenscheid A, Randall K. Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters. National Institute of Standards and Technology; 2019.
8. Brickell E, Pointcheval D, Vaudenay S, Yung M. Design validations for discrete logarithmbased signature schemes. In: Imai H, Zheng Y (editors). Public Key Cryptography. PKC 2000. Lecture Notes in Computer Science. Springer; 2000. Volume 1751. pp. 276–292.
9. Brown DRL. The exact security of ECDSA. Available online: https://cacr.uwaterloo.ca/techreports/2000/corr2000-54.ps (accessed on 30 August 2023).
10. Kim SR, Kyung R. Study on modified public key cryptosystem based on elgamal and cramer-shoup cryptosystems. In: Proceedings of the 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC); 2023; 8–11 March 2023; Las Vegas, NV, USA. pp. 0280–0284.
11. Zhou R, Lin Z. An improved exponential elgamal encryption scheme with additive homomorphism. In: Proceedings of the 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS); 15–17 July 2022; Huaihua, China. pp. 25–27.
12. ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley GR, Chaum D (editors). Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science. Springer; 2000. Volume 196. pp. 469–472.
13. Koblitz N. CM-Curves with good cryptographic properties. In: Feigenbaum J (editor). Advances in Cryptology—CRYPTO’91. CRYPTO 1991. Lecture Notes in Computer Science. Springer; 2001. Volume 576. pp. 279–287.
14. Silverman JH. An introduction to thetheory of elliptic curves. Available online: https://www.math.brown.edu/~jhs/Presentations/WyomingEllipticCurve.pdf (accessed on 21 July 2023).
15. Huang J, Jiao J, Wang Y, et al. Age-critical long erasure coding-CCSDS file delivery protocol for dual-hop S-IoT. IEEE Internet of Things Journal 2023. doi: 10.1109/JIOT.2023.3274519
16. Clarke NL, Katos V, Menesidou SA et al. A Novel Security Architecture for a Space-Data DTN. In: Koucheryavy Y, Mamatas L, Matta I, et al. (editors). Wired/Wireless Internet Communication. WWIC 2012. Lecture Notes in Computer Science, Springer; 2012. Volume 7277. pp. 31–45.
17. Liu Z, Liu R, Zhang H, et al. Parallel implementation of the CCSDS turbo decoder on GPU. In: China Communications (Early Access). IEEE; 2023. pp. 1–8.
18. Gupta K, Silakari S. Performance analysis for image encryption using ECC. In: Proceedings of the 2010 International Conference on Computational Intelligence and Communication Networks; 26–28 November 2010; Bhopal, India. pp. 79–82.
19. Aswatha AR, Sasi S, Santhosh B, et al. Design and implementation of unreliable CFDP protocol over elliptic curve cryptography. In: Satapathy S, Bhateja V, Mohanty J, et al. (editors). Smart Intelligent Computing and Applications, Smart Innovation, Systems and Technologies. Springer; 2019. Volume 160. pp. 627–638.
20. Khan NA, Awang A. Elliptic curve cryptography for the security of insecure internet of things. In: Proceedings of the 2022 International Conference on Future Trends in Smart Communities (ICFTSC); 1–2 December 2022; Kuching, Sarawak, Malaysia. pp. 59–64.
21. Fang X, Wu Y. Investigation into the elliptic curve cryptography. In: Proceedings of the 2017 3rd International Conference on Information Management (ICIM); 21–23 April 2017; Chengdu, China. pp. 412–415.
22. Ali Z, Ghani A, Khan I, et al. A robust authentication and access control protocol for securing wireless healthcare sensor networks. Journal of Information Security and Applications 2020; 52: 102502. doi: 10.1016/j.jisa.2020.102502
23. Pushpa SX, Raja KS. Enhanced ECC based authentication protocol in wireless sensor network with DoS mitigation. Cybernetics and Systems 2022; 53(8): 734–755. doi: 10.1080/01969722.2022.2055403
24. Srividya BV, Akhila S. Implementing a hybrid crypto-coding algorithm for an image on FPGA. In: Satapathy S, Joshi A (editors). Information and Communication Technology for Intelligent Systems (ICTIS 2017)-Volume 2. Springer; 2017. pp. 72–84.
25. Mahto D, Yadav DK. RSA and ECC: A comparative analysis. International Journal of Applied Engineering Research 2017; 12(19): 9053–9061.
DOI: https://doi.org/10.32629/jai.v6i3.740
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Smitha Sasi, Srividya Bharadwaj Venkata Subbu, Premkumar Manoharan, Laith Abualigah
License URL: https://creativecommons.org/licenses/by-nc/4.0