Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward-Curve Digital Signature Algorithm

被引:0
|
作者
Shankar G. [1 ]
Ai-Farhani L.H. [2 ]
Anitha Christy Angelin P. [3 ]
Singh P. [4 ]
Alqahtani A. [5 ]
Singh A. [6 ]
Kaur G. [7 ]
Samori I.A. [8 ]
机构
[1] Chandigarh University Mohali, Punjab, Mohali
[2] System Analysis, Control and Information Processing, Academy of Engineering, RUDN University, Moscow
[3] PSNA College of Engineering and Technology, Tamilnadu, Dindigul
[4] Central University of Punjab Bathinda, Punjab
[5] Department of Computer Science, College of Computer Science, King Khalid University, Abha
[6] Department of Basic Science, College of Science and Theoretical Study, Dammam-Female Branch, Saudi Electronic University
[7] Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab Rajpura
[8] School of Engineering Sciences, University of Ghana, Accra
关键词
D O I
10.1155/2023/2093407
中图分类号
学科分类号
摘要
At the moment, digital documents are just as important as paper documents. As a result, authenticity is essential, especially in legal situations and digital forensics. As technology advances, these digital signature algorithms become weaker, necessitating the development of digital authentication schemes capable of withstanding current security threats. This study proposed a scheme based on an asymmetric key cryptosystem and the user's biometric credentials to generate keys for digital signatures. A single document can be signed by multiple signatories at the same time under this scheme. The primary goal of this article is to create a safe and cost-effective multiignature scheme. To create keys for document signing and verification, the Edwards-curve Digital Signature Algorithm (EdDSA), especially Ed25519, is employed. The Edwards-curve Digital Signature Algorithm is used with blockchain technology to sign crypto wallets. The Python implementation of a scheme that enables platform independence. We performed performance, security, and comparative analysis to ensure maximum usability. The article's main findings are that the Ed25519 algorithm can be used in blockchain. © 2023 Gauri Shankar et al.
引用
收藏
相关论文
共 50 条
  • [31] Implementation of Elliptic Curve Digital Signature Algorithm on IRIS Nodes
    Zhang, Xing
    Ma, Shaohua
    Shi, Wei
    Han, Dong
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ESTIMATION, DETECTION AND INFORMATION FUSION ICEDIF 2015, 2015, : 403 - 406
  • [32] Trusted forensics scheme based on digital watermark algorithm in intelligent VANET
    Ma, Zhaofeng
    Jiang, Ming
    Huang, Weihua
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (06): : 1665 - 1678
  • [33] Trusted forensics scheme based on digital watermark algorithm in intelligent VANET
    Zhaofeng Ma
    Ming Jiang
    Weihua Huang
    Neural Computing and Applications, 2020, 32 : 1665 - 1678
  • [34] RETRACTED: A New Conic Curve Digital Signature Scheme (Retracted Article)
    Can, Xiang
    Lin, You
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 623 - +
  • [35] Digital multi-signature scheme based on the Elliptic Curve cryptosystem
    Tzer-Shyong Chen
    Kuo-Hsuan Huang
    Yu-Fang Chung
    Journal of Computer Science and Technology, 2004, 19 : 570 - 573
  • [36] ID-based digital signature scheme on the elliptic curve cryptosystem
    Chung, Yu Fang
    Huang, Kuo Hsuan
    Lai, Feipei
    Chen, Tzer Shyong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) : 601 - 604
  • [37] Digital multi-signature scheme based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (04) : 570 - IBC
  • [38] An Elliptic Curve Digital Signature Scheme Based on Proactive Secret Sharing
    Guo, Ping
    Zhang, Hong
    PROCEEDINGS OF THE 2009 WRI GLOBAL CONGRESS ON INTELLIGENT SYSTEMS, VOL II, 2009, : 523 - 525
  • [39] Two Improvements to Digital Signature Scheme Based on the Elliptic Curve Cryptosystem
    Long, Tao
    Liu, Xiaoxia
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 104 - 107
  • [40] Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
    Castiglione, Aniello
    De Santis, A.
    Soriente, C.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (05) : 750 - 764