SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010



           New Signature Derivation using Existing
                         Signatures
                                           N.R.Sunitha 1 and B.B.Amberker 2
      1
      Siddaganga Institute of Technology, Department of Computer Science & Engg., Tumkur, Karnataka, India.
                                             Email: nrsunitha@gmail.com
   2
     National Institute of Technology, Department of Computer Science & Engg., Warangal, Andhra Pradesh, India.
                                               Email: bba@nitw.ac.in


Abstract— In banks, as part of normal procedure, receipts            We extent the method to derive one signature from n
for deposits, statements of the bank account or credit card          existing signatures. We apply this method to
account are regularly issued to customers. This whole                automatically generate receipts by payees of cheques
procedure is time consuming. Also, officials often find it           after depositing the cheque. The motivation for this idea
difficult to sign for all the documents required by a                is derived from [1], where the authors derive a new
customer though the related sub-processes are completed
and corresponding documents are digitally signed. We
                                                                     signature from existing signatures using the property of
consider the scenario of e-receipt generation during e-              transitive closure of a graph.
cheque processing, where the subprocess like e-cheque                Before arriving at these methods of signature derivation,
verification and receiving acknowledgement from cheque               we initially used basic signature schemes like ElGamal
clearing bank are completed and digitally signed. But there          and DSA [8,5,4] signature schemes for signing the
is need for e-receipt to be generated by the bank for the            messages and later tried to derive new signature from
customer. When the number of e-cheques increase, it is a             existing signatures. Though a new signature was derived
burden for the bank to issue e-receipts. In this scenarios, we       and verification equation obtained, but the problem was,
observe that, it would be interesting if customers themselves        we were unable to derive a new signature similar to the
are capable of generating signed receipts based on the
signatures available on already completed transactions. This
                                                                     one that the signer would have generated if he had signed
calls for signature of a document to be derived from existing        himself. Also, the verification equation was different for
signatures of related documents. By this a customer can              signer signed messages and derived signatures. In the
derive signatures on his own without the intervention of the         following sections, in all the signature derivations we
bank which inturn reduces the work load on the bank. In all          consider, we take care that a new signature derived is
the signature derivations we make, we take care that a new           similar to the one that the signer would have generated if
signature derived is similar to the one that the signer would        he had signed himself and also all signatures either
have generated if he had signed himself and also all                 existing or derived are verified using the same
signatures either existing or derived are verified using the         verification equation.
same verification equation.
                                                                     The organisation of our paper is as follows: In Section II,
Index Terms— e-banking, e-cheque, Digital Signature,                 we discuss a method to derive a new signature from n
Signature derivation, public key                                     existing signatures and apply the concept of deriving
                                                                     signatures on e-receipts for e-cheques submitted to banks.
                     I. INTRODUCTION                                 In Section III, we extend the same method to
                                                                     continuously derive new signatures from existing and
In banks, as part of normal procedure, receipts for                  derived signatures. Lastly, we conclude.
deposits, statements of the bank account or credit card
account are regularly issued to customers [6, 7]. This
whole procedure is time consuming and paper intensive.               II SIGNATURE DERIVATION ON E-RECEIPTS FOR
It would be interesting if customers themselves are                         E-CHEQUES SUBMITTED TO BANKS
capable of generating such signed receipts and bank
statements based on the signatures available on already              When somebody gives us a cheque, we see that it is
completed transactions. This calls for methods to derive             deposited in our bank so that the cheque gets cleared
new signatures from existing signatures.                             from the payer’s bank and the cheque amount is
The first part of our paper discusses on deriving a new              deposited in our account. During this process, when we
signature from two existing signatures. Here the first               submit the cheque we expect a signed receipt to be issued
signature is obtained on message m1. The second                      by the bank. When the number of cheques submitted
signature is obtained on message m2. Supposing a                     increases, it is a burden for the bank to issue these
signature is required on m1,m2, the signer will generate             receipts. To address this problem we process the cheques
signature as he had generated the first and second                   electronically (e-cheques) and generate e-receipts. We
signatures using his secret key. We propose a method by              expect the e-receipt to contain the e-cheque details, a
which anyone can derive the signature on m1,m2 using                 message stating that the e-cheque is verified, e-cheque
the first and second signatures without the signer                   details sent to clearing bank and an acknowledgement
intervention.                                                        from the clearing bank, all digitally signed by the

                                                                 8
© 2010 ACEEE
DOI: 01.ijsip.01.01.02
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


servicing bank. We propose to use the property of                    The signature on (m2,m2’) is given by
signature derivation to generate e-receipts.                         (αj,k, βj,k, γj,k,m2,m2’), where
In e-cheque processing, the payee of e-cheque submits
the e-cheque details (let us call this m1) to his servicing          αj,k = H(m2) + (xj − xk)
bank. The servicing bank verifies the cheque details and
signs the message ”Cheque verified” (let us call this                βj,k = H(m2’) + (yj − yk)
m1’). Later the bank sends the relevant e-cheque details
(let us call this m2) to the cheque clearing bank which              γj,k = g H(m2).h H(m2’)
inturn sends a signed acknowledgement message for
receiving the e-cheque. As a customer trusts his own                 In this way any number of pairs of messages can be
servicing bank than the cheque clearing bank, there is               signed.
need for the servicing bank to sign the acknowledgement              The signature on n pairs of messages (m1,m1’, . . .
message (let us call this m2’) for the e-cheque details              ,mn,mn’) with the individual pairs of messages already
sent. During cheque processing, though the messages                  signed by the signer, with n + 1 pair of secret keys (x0,
m1,m1’, and m2,m2’ are already separately signed, for a              y0), . . . , (xn, yn) and n + 1 public keys v0, . . . , vn is
receipt to be generated, there is need for a single                  given by (α0,n, β0,n, γ0,n, (m1,m1’, . . . ,mn,mn’)) where,
signature on all the messages i.e. m1,m1’,m2,m2’. By
having single signature the space to store the signature is          α0,n = H(m1) + . . . + H(mn) + (x0 − xn)
reduced and also later for verification of the receipt, a
single verification will be sufficient. We propose to                β0,n = H(m1’) + . . . + H(mn’) + (y0 − yn)
derive a single signature on m1,m1’,m2,m2’ using the
existing signatures on m1,m1’, and m2,m2’.                           γ0,n = g H(m1)+...+H(mn) .h H(m1’)+...+H(mn’)
In this section, we propose a method to derive a new
signature from existing n signatures. The derived                    B. Signature derivation for n pairs of messages
signature is on all the messages of the existing signatures.
We do not perform any operation like concatenation or                We first discuss how to derive a signature using two
addition on the messages. By deriving a new signature,               existing signatures. Let (α i,j , β i,j , γ i,j ,m1,m1’) be the first
we only reduce the number of signatures.                             signatures and (α j,k, β j,k, γ j,k,m2,m2’) be the second
                                                                     signature. The derived signature will be of the form
                                                                     (i, k, α i,k, β i,k, γ i,k,m1,m2,m1’,m2’) where,
A. Signing algorithm for n pairs of messages:
                                                                     αi,k = αi,j + αj,k
We use the idea of generating secret keys and public key
from [1, 2]. To sign a pair of messages (m1,m1’), where                  = H(m1) + (xi − xj) + H(m2) + (xj − xk)
m1 can be considered as sender’s data and m1’ as signer’s
data, we need to have two pairs of private keys (xi, yi), (xj            = H(m1) + H(m2) + (xi − xk)
, yj) by choosing independently at random from Zq. Their
corresponding public keys vi, vj are                                 βi,k = βi,j + βj,k
computed as
                        vi = gxi.hyi                                     = H(m1’) + (yi − yj) + H(m2’) + (yj − yk)
                                xj   yj
                             vj = g .h                                   = H(m1’) + H(m2’) + (yi − yk)
where g and h are the generators of the subgroup Gq of
order q of Zp* . The signature on (m1,m1’), is given by (αi,j        γi,k = γ i,j. γ j,k
, βi,j , γi,j ,m1,m1’), where
                                                                         = g H(m1) .h H(m1’) .g H(m2) . h H(m2’)
                  αi,j = H(m1) + (xi − xj)
                                                                         = g H(m1)+H(m2) . h H(m1’)+H(m2’)
                 βi,j = H(m1’) + (yi − yj)
                                                                     If the signer himself signs for the message (m1, m2,
                    γi,j = g H(m1).h H(m1’)                          m1’,m2’), then he generates the signature
                                                                     (i, k, αi,k, β i,k, γi,k,m1,m2,m1’,m2’) where
where H(m) is a hash function [3].
To sign another pair of messages (m2,m2’), where m2 can
                                                                                   αi,k = H(m1) + H(m2) + (xi − xk)
be considered as sender’s data and m2’ as signer’s data,
we can utilize one of the pairs of previously used private
                                                                                  βi,k = H(m1’) + H(m2’) + (yi − yk)
keys say (xj , yj) and generate another pair (xk, yk) as
earlier. The corresponding public key vk is computed
                                                                                  γi,k = g H(m1)+H(m2) . h H(m1’)+H(m2’)
as
                        vk = g xk .h yk
.


                                                                 9
© 2010 ACEEE
DOI: 01.ijsip.01.01.02
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


We observe that the derived signature is identical to the                                 submission. The other components of the signature are
signature generated by the signer.                                                        computed as follows:
To derive a single signature (α0,n, β0,n, γ0,n, (m1,m1’, . .
. ,mn,mn’)) using n existing signatures of the above form,                                                       α j,k = H(m2) + (xj − xk)
we have
               α0,n = α0,1 + . . . + αn−1,n                                                                      βj,k = H(m2’) + (yj − yk)

                       β0,n = β0,1 + . . . + βn−1,n                                                                γ j,k = g H(m2) .h H(m2’)

                       γ0,n = γ0,1. . . . . γn−1,n                                        This signature is also published by the bank.
                                                                                          Generally the bank is expected to issue a receipt to the
C. Verification of either existing or derived                                             payee for cheque submission. In case the bank issues a
signature                                                                                 receipt with signature on m1,m1’,m2,m2’, the signature
                                                                                          can be generated using the first and the third secret key
The general equation to verify any signature (i, j, α i,j , β                             pairs as follows:
i,j , γ i,j ,m1,m1’) which could be either an existing or a                               (i, k, α i,k, β i,k, γ i,k,m1,m2,m1’,m2’) where
derived equation is as follows,
                                                                                                        α i,k = H(m1) + H(m2) + (xi − xk)
                      α i,j        β i,j
vi. γ i,j = vj. g           .h                                                 (1)
                                                                                                       β i,k = H(m1’) + H(m2’) + (yi − yk)
RHS = gxj .hyj .gH(m1)+(xi−xj ) .h H(m1’)+(yi−yj )
                                                                                                         γ i,k = g H(m1)+H(m2) . h H(m1’)+H(m2’)
    xj    yj        H(m1)          xi        −xj        H(m1’).    yi    −yj
= g .h         .g             .g        .g         .h             h .h
                                                                                          But as the number of cheque submissions increase, it
= g H(m1) .h H(m1’) .g xi.h yi                                                            becomes tedious to issue receipts for all payees of
                                                                                          cheques. Therefore we propose to derive the above
= γ i,j.vi                                                                                signature using the first and second signatures published
                                                                                          by the bank using the following equations:
= LHS.
                                                                                          α i,k = α i,j + α j,k
D. e-Receipt generation
                                                                                                = H(m1) + (xi − xj) + H(m2) + (xj − xk)
When a payee submits a cheque, the bank creates the first
pair of secret keys (xi, yi) by choosing independently at                                      = H(m1) + H(m2) + (xi − xk)
random from Zq. g and h are the generators of the
subgroup Gq of order q of Zp* . The public key vi is                                      βi,k = βi,j + βj,k
computed as vi = g xi . h yi . The cheque details are
available in m1. The bank creates the second pair of                                           = H(m1’) + (yi − yj) + H(m2’) + (yj − yk)
secret keys (xj , yj) as earlier and computes the public key
vj as vj = gxj .hyj . The bank verifies the cheque and                                         = H(m1’) + H(m2’) + (yi − yk)
generates a message m1’ which contains the message
saying that the cheque is verified. It creates the first                                  γ i,k = γ i,j. γ j,k
signature on messages m1 and m1’ using the first and
second secret key pairs. The signature is (i, j, α i,j , βi,j ,                              = g H(m1) . h H(m1’) . g H(m2).h H(m2’)
γ i,j ,m1,m1’), where
                   α i,j = H(m1) + (xi − xj)                                                 = g H(m1)+H(m2) . h H(m1’)+H(m2’)
                                                                                          Any signature can be verified using equation (1).
                          βi,j = H(m1’) + (yi − yj)
                                                                                          As the first and second signatures related to the cheque
                                                                                          processing are already done and published by the bank
                               γ i,j = g H(m1) .h H(m1’)
                                                                                          when the relevant process is completed, the payee of the
                                                                                          cheque can generate the receipt on his own without the
                                                                                          bank’s intervention. Thus the load on the bank to
The bank publishes this signature for the payee of the
                                                                                          generate receipts is totally removed.
cheque. Now the bank submits the cheque to the payer’s
bank and gets the acknowledgement message for cheque
                                                                                          III CONTINUOUS DERIVATION   OF NEW
submission. The bank creates the third pair of secret keys
                                                                                          SIGNATURES FROM EXISTING AND DERIVED
(xk, yk) as earlier and computes the public key vk as vk =
                                                                                          SIGNATURES
g xk .h yk . The bank creates a second signature (α j,k, βj,k,
γj,k, m2, m2’) using the second and third secret key pairs
                                                                                          Here we extend the method discussed in the previous
where m2 indicates the cheque details sent by bank to
                                                                                          section to derive new signature from derived and existing
payer’s bank and m2’ indicates the acknowledgement
                                                                                          signatures. This helps us to continuously derive
message received from payer’s bank for cheque
                                                                                          signatures on the new messages generated. Alice creates
                                                                                     10
© 2010 ACEEE
DOI: 01.ijsip.01.01.02
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


an initial node i with secret keys (xi, yi) (see Figure1),               Similar to (i, j), (j, k) is also modified. This signature is
where (xi, yi) is chosen independently at random from                    also published by Alice. If a signature is required related
Zq. g and h are the generators of the subgroup Gq of                     to both T1 and T2, Alice can sign using the unique pair of
order q of Zp* . The public key vi is computed as vi = g                 secret keys earlier used to generate signatures on m1,m1’
xi
  .h yi . To process a transaction T1 of customer, Alice                 and m2,m2’, i.e. (xi, yi), (xk, yk). The signature will be
creates a node j with secret keys (xj , yj) and public key               (i, k, α i,k, β i,k, γ i,k,m1,m2,m1’,m2’) where
vj computed as vj = g xj .h yj . Let m1 be the data message
sent by the customer and m1’ be the numerical value                      α i,k = H(m1) + H(m2) + (xi − xk)
related to transaction T1. To sign the messages m1,m1’,
Alice creates the signature (i, j, α i,j , βi,j , γ i,j ,m1,m1’),        β i,k = H(m1’) + H(m2’) + (yi − yk)
where
                 α i,j = H(m1) + (xi − xj)                               γ i,k = (m1’ + m2’) g H(m1)+H(m2) . h H(m1’)+H(m2’)

                  βi,j = H(m10) + (yi − yj)                              We observe that for the message m1,m1’,m2,m2’, the
                                                                         above generated signature can be derived using the
                  γ i,j = m1’g H(m1) . h H(m1’)                          signature on m1,m1’ and m2,m2’. Let us call this derived
                                                                         signature as D1.
When compared to the previous method of generating
new signature, we have modified the equation of γ i,j by                 α i,k = α i,j + α j,k
multiplying with m1’, which later helps the customer to
substitute the data message received from the signer in                       = H(m1) + (xi − xj) + H(m2) + (xj − xk)
the verification of signature and verify its validity. This
signature is published by Alice.                                              = H(m1) + H(m2) + (xi − xk)

For the second transaction T2 Alice creates another                      β i,k = β i,j + β j,k
node k with secret keys (xk, yk) and public key vk =
g xk .h yk . Let m2 be the data message sent by the                           = H(m1’) + (yi − yj) + H(m2’) + (yj − yk)
customer and m2’ be numerical value related to
transaction T1. To sign the messages m2,m2’, Alice                       = H(m1’) + H(m2’) + (yi − yk)
creates the signature (j, k, α j,k, β j,k, γj,k,m2,m2), where
                                                                         γ i,k = γ i,j. γ j,k.(m1’.m2’)−1.(m1 + m2)

                                                                              = m1’.g H(m1).h H(m1’) . m2’. g H(m2). h H(m2’).
                                                                                (m1’.m2’)−1.(m1’ + m2’)

                                                                              = (m1’ + m2’).g H(m1)+H(m2) . h H(m1’)+H(m2’)
                                                                         If a third transaction T3 is required, a new node l can be
                                                                         created with secret keys (xl, yl) and public key vl = g xl .
                                                                         h yl . Let m3 be the data message sent by the customer
                                                                         and m3’ be the numerical value related to transaction T3.
                                                                         To sign the messages m3,m3’, Alice creates the signature,
                                                                         (k, l, αk,l, βk,l,γk,l,m3,m3’), where

                                                                         αk,l = H(m3) + (xk − xl)

                                                                         βk,l = H(m3’) + (yk − yl)

                                                                         γk,l = m3’ g H(m3) .h H(m3’)
                                                                         To derive a signature on messages of transactions of T1,
                                                                         T2 and T3, we can use signature of D1 (as D1 signature is
Figure 1: New Signatures Derivation from existing                        derived from signatures on messages on T1 and T2) and
signature and a derived signature                                        signature related related to T3, . Thus whenever messages
                                                                         of new transaction are to be signed, a new node can be
α j,k = H(m2) + (xj − xk)                                                created with secret keys and public key and attached to
                                                                         the previous transaction node. To obtain signature on all
β j,k = H(m2’) + (yj − yk)                                               the messages till this new transaction, signature of the
                                                                         new transaction and the previous derived signature can be
γ j,k = m2’ g H(m2).h H(m2’)                                             used.




                                                                    11
© 2010 ACEEE
DOI: 01.ijsip.01.01.02
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


Any signature can be verified using the following                          Dept. of Commerce/NIST, National Technical
equation: Let us verify the signature                                      Information Service, Springfield, Virginia, 1994.
(i, j, α i,j , β i,j , γ i,j ,m1,m1’) created for transaction T1.
                                                                           [6] David J. Olkowski, Jr.,Information Security Issues in
vi.i,j = (m1’ + m2’).vj.g αi,j . h βi,j                         (2)        E-Commerce ,SANS GIAC Security Essentials March 26,
                                                                           2001.
RHS = m1’.g xj . h yj .g H(m1)+(xi−xj ) . h H(m1’) + (yi−yj )
                                                                           [7] Randy C. Marchany , Joseph G. Tront, E-Commerce
= m1’.g xj . h yj .g H(m1).g xi .g −xj .h H(m1’).h yi . h −yj              Security Issues, Proceedings of the 35th Hawaii
                                                                           International Conference on System Sciences - 2002.
= m1’.g H(m1).h H(m1’).g xi. h yi
                                                                           [8] Burt Kaliski : RSA Digital Signature Standards,
= γ i,j . vi                                                               RSA laboratories, 23rd National Information Systems
                                                                           Security Conference, Oct.16-19, 2000.
= LHS.

(m1’+m2’) in the verification equation helps the verifier
to substitute the values received from the signers and the
verify the validity of the values. It must be noted that
each customer transactions must be handled separately by
creating a different set of nodes.

                          CONCLUSION

We have considered a scenario in banking environment
where there is need to frequently issue signed receipts for
the e-cheque deposited by the payee. Here, messages are
signed as and when the related subprocess are completed.
 In our initial work on New Signature Derivation, we
have come up with a method in which customers
themselves can generate such signed receipts based on
the signatures available on already completed
transactions without the intervention of the bank which
inturn reduces the work load on the bank. In all the
signature derivations we make, we take care that a new
signature derived is similar to the one that the signer
would have generated if he had signed himself and also
all signatures either existing or derived are verified using
the same verification equation.


                          REFERENCES

[1] S. Micali, R.L. Rivest: Transitive Signature
Schemes, CT-RSA 2002: 236- 243.

[2] M. Bellare and G. Neven. Transitive Signatures
based on Factoring and RSA. Advances in Cryptology -
Asiacrypt 2002 Proceedings, Lecture
Notes in Computer Science Vol. 2501, Y. Zheng ed,
Springer-Verlag, 2002.

[3] Damgard, I.: Collision-free hash functions and public
key signature schemes. In: EUROCRYPT 87,
LNCS, Vol.304, pp. 203216, Springer- Verlag, (1987).

[4] Taher ElGamal: A Public Cryptosystem and a
Signature Scheme based on Discrete Logarithms, IEEE
transactions on Information Theory, Vol. IT-31,
No.4, (1985).

[5] FIPS 186. Digital signature standard. Federal
Information Processing Standards Publication 186, U.S.
                                                                      12
© 2010 ACEEE
DOI: 01.ijsip.01.01.02

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (6)

3d
3d3d
3d
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2
 
Dsa & Digi Cert
Dsa & Digi CertDsa & Digi Cert
Dsa & Digi Cert
 
53398506 10-case-study-digital-signature
53398506 10-case-study-digital-signature53398506 10-case-study-digital-signature
53398506 10-case-study-digital-signature
 
3dpassword
3dpassword3dpassword
3dpassword
 
Anonymous Credentials on Java Card - SIT Smartcard 2011
Anonymous Credentials on Java Card - SIT Smartcard 2011Anonymous Credentials on Java Card - SIT Smartcard 2011
Anonymous Credentials on Java Card - SIT Smartcard 2011
 

Ähnlich wie New Signature Derivation using Existing Signatures

CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptxAkash588342
 
Secured Online Payment System
Secured Online Payment SystemSecured Online Payment System
Secured Online Payment SystemIRJET Journal
 
Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...
Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...
Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...IJCNCJournal
 
CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...
CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...
CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...IJCNCJournal
 
Pay your payments safely merchant account services by jay wigdore
Pay your payments safely  merchant account services by jay wigdorePay your payments safely  merchant account services by jay wigdore
Pay your payments safely merchant account services by jay wigdoreJayWigdore
 
What is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscWhat is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscDSC Delhi
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...CSCJournals
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerPalash Mehar
 
Protocol Payment in M-commerce Transaction
Protocol Payment in M-commerce TransactionProtocol Payment in M-commerce Transaction
Protocol Payment in M-commerce Transactioniosrjce
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Secure Web Transaction
Secure Web TransactionSecure Web Transaction
Secure Web Transactionvikisharma24
 

Ähnlich wie New Signature Derivation using Existing Signatures (20)

Electronic cheque
Electronic chequeElectronic cheque
Electronic cheque
 
E Cheques
E ChequesE Cheques
E Cheques
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
1893 1896
1893 18961893 1896
1893 1896
 
1893 1896
1893 18961893 1896
1893 1896
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptx
 
Secured Online Payment System
Secured Online Payment SystemSecured Online Payment System
Secured Online Payment System
 
Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...
Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...
Constructing New Collective Signature Schemes Base on Two Hard Problems Facto...
 
CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...
CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...
CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTO...
 
e-cheque
e-chequee-cheque
e-cheque
 
Pay your payments safely merchant account services by jay wigdore
Pay your payments safely  merchant account services by jay wigdorePay your payments safely  merchant account services by jay wigdore
Pay your payments safely merchant account services by jay wigdore
 
What is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscWhat is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dsc
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
 
P0176598101
P0176598101P0176598101
P0176598101
 
Protocol Payment in M-commerce Transaction
Protocol Payment in M-commerce TransactionProtocol Payment in M-commerce Transaction
Protocol Payment in M-commerce Transaction
 
Mb2420032007
Mb2420032007Mb2420032007
Mb2420032007
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Secure Web Transaction
Secure Web TransactionSecure Web Transaction
Secure Web Transaction
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

New Signature Derivation using Existing Signatures

  • 1. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 New Signature Derivation using Existing Signatures N.R.Sunitha 1 and B.B.Amberker 2 1 Siddaganga Institute of Technology, Department of Computer Science & Engg., Tumkur, Karnataka, India. Email: nrsunitha@gmail.com 2 National Institute of Technology, Department of Computer Science & Engg., Warangal, Andhra Pradesh, India. Email: bba@nitw.ac.in Abstract— In banks, as part of normal procedure, receipts We extent the method to derive one signature from n for deposits, statements of the bank account or credit card existing signatures. We apply this method to account are regularly issued to customers. This whole automatically generate receipts by payees of cheques procedure is time consuming. Also, officials often find it after depositing the cheque. The motivation for this idea difficult to sign for all the documents required by a is derived from [1], where the authors derive a new customer though the related sub-processes are completed and corresponding documents are digitally signed. We signature from existing signatures using the property of consider the scenario of e-receipt generation during e- transitive closure of a graph. cheque processing, where the subprocess like e-cheque Before arriving at these methods of signature derivation, verification and receiving acknowledgement from cheque we initially used basic signature schemes like ElGamal clearing bank are completed and digitally signed. But there and DSA [8,5,4] signature schemes for signing the is need for e-receipt to be generated by the bank for the messages and later tried to derive new signature from customer. When the number of e-cheques increase, it is a existing signatures. Though a new signature was derived burden for the bank to issue e-receipts. In this scenarios, we and verification equation obtained, but the problem was, observe that, it would be interesting if customers themselves we were unable to derive a new signature similar to the are capable of generating signed receipts based on the signatures available on already completed transactions. This one that the signer would have generated if he had signed calls for signature of a document to be derived from existing himself. Also, the verification equation was different for signatures of related documents. By this a customer can signer signed messages and derived signatures. In the derive signatures on his own without the intervention of the following sections, in all the signature derivations we bank which inturn reduces the work load on the bank. In all consider, we take care that a new signature derived is the signature derivations we make, we take care that a new similar to the one that the signer would have generated if signature derived is similar to the one that the signer would he had signed himself and also all signatures either have generated if he had signed himself and also all existing or derived are verified using the same signatures either existing or derived are verified using the verification equation. same verification equation. The organisation of our paper is as follows: In Section II, Index Terms— e-banking, e-cheque, Digital Signature, we discuss a method to derive a new signature from n Signature derivation, public key existing signatures and apply the concept of deriving signatures on e-receipts for e-cheques submitted to banks. I. INTRODUCTION In Section III, we extend the same method to continuously derive new signatures from existing and In banks, as part of normal procedure, receipts for derived signatures. Lastly, we conclude. deposits, statements of the bank account or credit card account are regularly issued to customers [6, 7]. This whole procedure is time consuming and paper intensive. II SIGNATURE DERIVATION ON E-RECEIPTS FOR It would be interesting if customers themselves are E-CHEQUES SUBMITTED TO BANKS capable of generating such signed receipts and bank statements based on the signatures available on already When somebody gives us a cheque, we see that it is completed transactions. This calls for methods to derive deposited in our bank so that the cheque gets cleared new signatures from existing signatures. from the payer’s bank and the cheque amount is The first part of our paper discusses on deriving a new deposited in our account. During this process, when we signature from two existing signatures. Here the first submit the cheque we expect a signed receipt to be issued signature is obtained on message m1. The second by the bank. When the number of cheques submitted signature is obtained on message m2. Supposing a increases, it is a burden for the bank to issue these signature is required on m1,m2, the signer will generate receipts. To address this problem we process the cheques signature as he had generated the first and second electronically (e-cheques) and generate e-receipts. We signatures using his secret key. We propose a method by expect the e-receipt to contain the e-cheque details, a which anyone can derive the signature on m1,m2 using message stating that the e-cheque is verified, e-cheque the first and second signatures without the signer details sent to clearing bank and an acknowledgement intervention. from the clearing bank, all digitally signed by the 8 © 2010 ACEEE DOI: 01.ijsip.01.01.02
  • 2. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 servicing bank. We propose to use the property of The signature on (m2,m2’) is given by signature derivation to generate e-receipts. (αj,k, βj,k, γj,k,m2,m2’), where In e-cheque processing, the payee of e-cheque submits the e-cheque details (let us call this m1) to his servicing αj,k = H(m2) + (xj − xk) bank. The servicing bank verifies the cheque details and signs the message ”Cheque verified” (let us call this βj,k = H(m2’) + (yj − yk) m1’). Later the bank sends the relevant e-cheque details (let us call this m2) to the cheque clearing bank which γj,k = g H(m2).h H(m2’) inturn sends a signed acknowledgement message for receiving the e-cheque. As a customer trusts his own In this way any number of pairs of messages can be servicing bank than the cheque clearing bank, there is signed. need for the servicing bank to sign the acknowledgement The signature on n pairs of messages (m1,m1’, . . . message (let us call this m2’) for the e-cheque details ,mn,mn’) with the individual pairs of messages already sent. During cheque processing, though the messages signed by the signer, with n + 1 pair of secret keys (x0, m1,m1’, and m2,m2’ are already separately signed, for a y0), . . . , (xn, yn) and n + 1 public keys v0, . . . , vn is receipt to be generated, there is need for a single given by (α0,n, β0,n, γ0,n, (m1,m1’, . . . ,mn,mn’)) where, signature on all the messages i.e. m1,m1’,m2,m2’. By having single signature the space to store the signature is α0,n = H(m1) + . . . + H(mn) + (x0 − xn) reduced and also later for verification of the receipt, a single verification will be sufficient. We propose to β0,n = H(m1’) + . . . + H(mn’) + (y0 − yn) derive a single signature on m1,m1’,m2,m2’ using the existing signatures on m1,m1’, and m2,m2’. γ0,n = g H(m1)+...+H(mn) .h H(m1’)+...+H(mn’) In this section, we propose a method to derive a new signature from existing n signatures. The derived B. Signature derivation for n pairs of messages signature is on all the messages of the existing signatures. We do not perform any operation like concatenation or We first discuss how to derive a signature using two addition on the messages. By deriving a new signature, existing signatures. Let (α i,j , β i,j , γ i,j ,m1,m1’) be the first we only reduce the number of signatures. signatures and (α j,k, β j,k, γ j,k,m2,m2’) be the second signature. The derived signature will be of the form (i, k, α i,k, β i,k, γ i,k,m1,m2,m1’,m2’) where, A. Signing algorithm for n pairs of messages: αi,k = αi,j + αj,k We use the idea of generating secret keys and public key from [1, 2]. To sign a pair of messages (m1,m1’), where = H(m1) + (xi − xj) + H(m2) + (xj − xk) m1 can be considered as sender’s data and m1’ as signer’s data, we need to have two pairs of private keys (xi, yi), (xj = H(m1) + H(m2) + (xi − xk) , yj) by choosing independently at random from Zq. Their corresponding public keys vi, vj are βi,k = βi,j + βj,k computed as vi = gxi.hyi = H(m1’) + (yi − yj) + H(m2’) + (yj − yk) xj yj vj = g .h = H(m1’) + H(m2’) + (yi − yk) where g and h are the generators of the subgroup Gq of order q of Zp* . The signature on (m1,m1’), is given by (αi,j γi,k = γ i,j. γ j,k , βi,j , γi,j ,m1,m1’), where = g H(m1) .h H(m1’) .g H(m2) . h H(m2’) αi,j = H(m1) + (xi − xj) = g H(m1)+H(m2) . h H(m1’)+H(m2’) βi,j = H(m1’) + (yi − yj) If the signer himself signs for the message (m1, m2, γi,j = g H(m1).h H(m1’) m1’,m2’), then he generates the signature (i, k, αi,k, β i,k, γi,k,m1,m2,m1’,m2’) where where H(m) is a hash function [3]. To sign another pair of messages (m2,m2’), where m2 can αi,k = H(m1) + H(m2) + (xi − xk) be considered as sender’s data and m2’ as signer’s data, we can utilize one of the pairs of previously used private βi,k = H(m1’) + H(m2’) + (yi − yk) keys say (xj , yj) and generate another pair (xk, yk) as earlier. The corresponding public key vk is computed γi,k = g H(m1)+H(m2) . h H(m1’)+H(m2’) as vk = g xk .h yk . 9 © 2010 ACEEE DOI: 01.ijsip.01.01.02
  • 3. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 We observe that the derived signature is identical to the submission. The other components of the signature are signature generated by the signer. computed as follows: To derive a single signature (α0,n, β0,n, γ0,n, (m1,m1’, . . . ,mn,mn’)) using n existing signatures of the above form, α j,k = H(m2) + (xj − xk) we have α0,n = α0,1 + . . . + αn−1,n βj,k = H(m2’) + (yj − yk) β0,n = β0,1 + . . . + βn−1,n γ j,k = g H(m2) .h H(m2’) γ0,n = γ0,1. . . . . γn−1,n This signature is also published by the bank. Generally the bank is expected to issue a receipt to the C. Verification of either existing or derived payee for cheque submission. In case the bank issues a signature receipt with signature on m1,m1’,m2,m2’, the signature can be generated using the first and the third secret key The general equation to verify any signature (i, j, α i,j , β pairs as follows: i,j , γ i,j ,m1,m1’) which could be either an existing or a (i, k, α i,k, β i,k, γ i,k,m1,m2,m1’,m2’) where derived equation is as follows, α i,k = H(m1) + H(m2) + (xi − xk) α i,j β i,j vi. γ i,j = vj. g .h (1) β i,k = H(m1’) + H(m2’) + (yi − yk) RHS = gxj .hyj .gH(m1)+(xi−xj ) .h H(m1’)+(yi−yj ) γ i,k = g H(m1)+H(m2) . h H(m1’)+H(m2’) xj yj H(m1) xi −xj H(m1’). yi −yj = g .h .g .g .g .h h .h But as the number of cheque submissions increase, it = g H(m1) .h H(m1’) .g xi.h yi becomes tedious to issue receipts for all payees of cheques. Therefore we propose to derive the above = γ i,j.vi signature using the first and second signatures published by the bank using the following equations: = LHS. α i,k = α i,j + α j,k D. e-Receipt generation = H(m1) + (xi − xj) + H(m2) + (xj − xk) When a payee submits a cheque, the bank creates the first pair of secret keys (xi, yi) by choosing independently at = H(m1) + H(m2) + (xi − xk) random from Zq. g and h are the generators of the subgroup Gq of order q of Zp* . The public key vi is βi,k = βi,j + βj,k computed as vi = g xi . h yi . The cheque details are available in m1. The bank creates the second pair of = H(m1’) + (yi − yj) + H(m2’) + (yj − yk) secret keys (xj , yj) as earlier and computes the public key vj as vj = gxj .hyj . The bank verifies the cheque and = H(m1’) + H(m2’) + (yi − yk) generates a message m1’ which contains the message saying that the cheque is verified. It creates the first γ i,k = γ i,j. γ j,k signature on messages m1 and m1’ using the first and second secret key pairs. The signature is (i, j, α i,j , βi,j , = g H(m1) . h H(m1’) . g H(m2).h H(m2’) γ i,j ,m1,m1’), where α i,j = H(m1) + (xi − xj) = g H(m1)+H(m2) . h H(m1’)+H(m2’) Any signature can be verified using equation (1). βi,j = H(m1’) + (yi − yj) As the first and second signatures related to the cheque processing are already done and published by the bank γ i,j = g H(m1) .h H(m1’) when the relevant process is completed, the payee of the cheque can generate the receipt on his own without the bank’s intervention. Thus the load on the bank to The bank publishes this signature for the payee of the generate receipts is totally removed. cheque. Now the bank submits the cheque to the payer’s bank and gets the acknowledgement message for cheque III CONTINUOUS DERIVATION OF NEW submission. The bank creates the third pair of secret keys SIGNATURES FROM EXISTING AND DERIVED (xk, yk) as earlier and computes the public key vk as vk = SIGNATURES g xk .h yk . The bank creates a second signature (α j,k, βj,k, γj,k, m2, m2’) using the second and third secret key pairs Here we extend the method discussed in the previous where m2 indicates the cheque details sent by bank to section to derive new signature from derived and existing payer’s bank and m2’ indicates the acknowledgement signatures. This helps us to continuously derive message received from payer’s bank for cheque signatures on the new messages generated. Alice creates 10 © 2010 ACEEE DOI: 01.ijsip.01.01.02
  • 4. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 an initial node i with secret keys (xi, yi) (see Figure1), Similar to (i, j), (j, k) is also modified. This signature is where (xi, yi) is chosen independently at random from also published by Alice. If a signature is required related Zq. g and h are the generators of the subgroup Gq of to both T1 and T2, Alice can sign using the unique pair of order q of Zp* . The public key vi is computed as vi = g secret keys earlier used to generate signatures on m1,m1’ xi .h yi . To process a transaction T1 of customer, Alice and m2,m2’, i.e. (xi, yi), (xk, yk). The signature will be creates a node j with secret keys (xj , yj) and public key (i, k, α i,k, β i,k, γ i,k,m1,m2,m1’,m2’) where vj computed as vj = g xj .h yj . Let m1 be the data message sent by the customer and m1’ be the numerical value α i,k = H(m1) + H(m2) + (xi − xk) related to transaction T1. To sign the messages m1,m1’, Alice creates the signature (i, j, α i,j , βi,j , γ i,j ,m1,m1’), β i,k = H(m1’) + H(m2’) + (yi − yk) where α i,j = H(m1) + (xi − xj) γ i,k = (m1’ + m2’) g H(m1)+H(m2) . h H(m1’)+H(m2’) βi,j = H(m10) + (yi − yj) We observe that for the message m1,m1’,m2,m2’, the above generated signature can be derived using the γ i,j = m1’g H(m1) . h H(m1’) signature on m1,m1’ and m2,m2’. Let us call this derived signature as D1. When compared to the previous method of generating new signature, we have modified the equation of γ i,j by α i,k = α i,j + α j,k multiplying with m1’, which later helps the customer to substitute the data message received from the signer in = H(m1) + (xi − xj) + H(m2) + (xj − xk) the verification of signature and verify its validity. This signature is published by Alice. = H(m1) + H(m2) + (xi − xk) For the second transaction T2 Alice creates another β i,k = β i,j + β j,k node k with secret keys (xk, yk) and public key vk = g xk .h yk . Let m2 be the data message sent by the = H(m1’) + (yi − yj) + H(m2’) + (yj − yk) customer and m2’ be numerical value related to transaction T1. To sign the messages m2,m2’, Alice = H(m1’) + H(m2’) + (yi − yk) creates the signature (j, k, α j,k, β j,k, γj,k,m2,m2), where γ i,k = γ i,j. γ j,k.(m1’.m2’)−1.(m1 + m2) = m1’.g H(m1).h H(m1’) . m2’. g H(m2). h H(m2’). (m1’.m2’)−1.(m1’ + m2’) = (m1’ + m2’).g H(m1)+H(m2) . h H(m1’)+H(m2’) If a third transaction T3 is required, a new node l can be created with secret keys (xl, yl) and public key vl = g xl . h yl . Let m3 be the data message sent by the customer and m3’ be the numerical value related to transaction T3. To sign the messages m3,m3’, Alice creates the signature, (k, l, αk,l, βk,l,γk,l,m3,m3’), where αk,l = H(m3) + (xk − xl) βk,l = H(m3’) + (yk − yl) γk,l = m3’ g H(m3) .h H(m3’) To derive a signature on messages of transactions of T1, T2 and T3, we can use signature of D1 (as D1 signature is Figure 1: New Signatures Derivation from existing derived from signatures on messages on T1 and T2) and signature and a derived signature signature related related to T3, . Thus whenever messages of new transaction are to be signed, a new node can be α j,k = H(m2) + (xj − xk) created with secret keys and public key and attached to the previous transaction node. To obtain signature on all β j,k = H(m2’) + (yj − yk) the messages till this new transaction, signature of the new transaction and the previous derived signature can be γ j,k = m2’ g H(m2).h H(m2’) used. 11 © 2010 ACEEE DOI: 01.ijsip.01.01.02
  • 5. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 Any signature can be verified using the following Dept. of Commerce/NIST, National Technical equation: Let us verify the signature Information Service, Springfield, Virginia, 1994. (i, j, α i,j , β i,j , γ i,j ,m1,m1’) created for transaction T1. [6] David J. Olkowski, Jr.,Information Security Issues in vi.i,j = (m1’ + m2’).vj.g αi,j . h βi,j (2) E-Commerce ,SANS GIAC Security Essentials March 26, 2001. RHS = m1’.g xj . h yj .g H(m1)+(xi−xj ) . h H(m1’) + (yi−yj ) [7] Randy C. Marchany , Joseph G. Tront, E-Commerce = m1’.g xj . h yj .g H(m1).g xi .g −xj .h H(m1’).h yi . h −yj Security Issues, Proceedings of the 35th Hawaii International Conference on System Sciences - 2002. = m1’.g H(m1).h H(m1’).g xi. h yi [8] Burt Kaliski : RSA Digital Signature Standards, = γ i,j . vi RSA laboratories, 23rd National Information Systems Security Conference, Oct.16-19, 2000. = LHS. (m1’+m2’) in the verification equation helps the verifier to substitute the values received from the signers and the verify the validity of the values. It must be noted that each customer transactions must be handled separately by creating a different set of nodes. CONCLUSION We have considered a scenario in banking environment where there is need to frequently issue signed receipts for the e-cheque deposited by the payee. Here, messages are signed as and when the related subprocess are completed. In our initial work on New Signature Derivation, we have come up with a method in which customers themselves can generate such signed receipts based on the signatures available on already completed transactions without the intervention of the bank which inturn reduces the work load on the bank. In all the signature derivations we make, we take care that a new signature derived is similar to the one that the signer would have generated if he had signed himself and also all signatures either existing or derived are verified using the same verification equation. REFERENCES [1] S. Micali, R.L. Rivest: Transitive Signature Schemes, CT-RSA 2002: 236- 243. [2] M. Bellare and G. Neven. Transitive Signatures based on Factoring and RSA. Advances in Cryptology - Asiacrypt 2002 Proceedings, Lecture Notes in Computer Science Vol. 2501, Y. Zheng ed, Springer-Verlag, 2002. [3] Damgard, I.: Collision-free hash functions and public key signature schemes. In: EUROCRYPT 87, LNCS, Vol.304, pp. 203216, Springer- Verlag, (1987). [4] Taher ElGamal: A Public Cryptosystem and a Signature Scheme based on Discrete Logarithms, IEEE transactions on Information Theory, Vol. IT-31, No.4, (1985). [5] FIPS 186. Digital signature standard. Federal Information Processing Standards Publication 186, U.S. 12 © 2010 ACEEE DOI: 01.ijsip.01.01.02