Skip to main content

Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11634))

Included in the following conference series:

Abstract

In digital signature, the digital signature based on elliptic curve cryptosystem has higher security. Elliptic curve cryptography (ECC) is the transfer of discrete logarithmic cryptography to elliptic curve. Compared with other cryptosystems, elliptic curve cryptography has the advantages of short key, small storage space, narrow bandwidth and high security. This paper focuses on the security of elliptic curve digital signature scheme. By analyzing the signature scheme of Zhang Qingsheng et al., we find that this scheme has the risk of replacing messages to forge the signature. In view of this risk, this paper proposes an improved scheme based on elliptic curve discrete logarithm problem. Furthermore, in this paper, we analyze the security of our improved scheme against the random number attack, the unknown plaintext and ciphertext attack and the replacement messages forged signature attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gao, W., Zhang, G., Wang, X.: An improved elliptic curve digital signature algorithm. J. Nat. Sci. Heilongjiang Univ. 26(06), 775–780 (2009)

    Google Scholar 

  2. Wu, F., Zhang, X., Yao, W., et al.: An advanced quantum-resistant signature scheme for cloud based on eisenstein ring. CMC: Comput. Mater. Contin. 56(1), 19–34 (2018)

    Google Scholar 

  3. Ren, Z.G., Zhai, D.: Selection of security elliptic curve in finite field GF(q). Inf. Electron. Eng. 7(05), 493–496 (2009)

    Google Scholar 

  4. Gopinath, V., Bhuvaneswaran, R.S.: Design of ECC based secured cloud storage mechanism for transaction rich applications. CMC: Comput. Mater. Contin. 57(2), 341–352 (2018)

    Google Scholar 

  5. Zhang, Q., Guo, B., Xu, S., et al.: Fast elliptic curve signature verification algorithm. Comput. Eng. Des. 29(17), 4425–4427 (2008)

    Google Scholar 

  6. Pan, X.: A new digital signature scheme based on elliptic curve. Appl. Comput. Syst. 17(1), 35–37 (2008)

    Google Scholar 

  7. Yang, Q., Xin, X., Ji, W.: Digital signature and proxy digital signature based on elliptic curve. Comput. Eng. 34(23), 147–149 (2008)

    Google Scholar 

  8. Wu, M., Liu, R., Zhang, F.: An improved algorithm for elliptic curve digital signature based on wireless LAN. Commun. Technol. 42(04), 108–110 (2009)

    Google Scholar 

  9. Chen, L., You, L.: Optimization and design of elliptic curve digital signature algorithm. Electron. Dev. 34(1), 89–93 (2011)

    MathSciNet  Google Scholar 

  10. Yan, L., Lu, C.: An elliptic curve digital signature scheme based on fast scalar multiplication algorithm. Electron. Sci. Technol. 27(4), 23–26 (2014)

    Google Scholar 

  11. Huiyan, C., Yong, Y., Zongjie, W., et al.: A forward secure digital signature based on elliptic curve. Telecommun. Sci. 31(10), 99–102 (2015)

    Google Scholar 

  12. Zhou, K.: Analysis and improvement of an elliptic curve message recovery digital signature scheme. J. Northwest Normal Univ. (Nat. Sci. Ed.) 52(4), 38–40 (2016)

    Google Scholar 

  13. Han, J., Cui, Z.: Data consistency verification method for election system. J. Comput. Appl. 37(S2), 52–56 (2017)

    Google Scholar 

  14. Li, J., Miao, X.: Analysis and improvement of forward-secure digital signature scheme. J. Jilin Univ. (Inf. Sci. Ed.) 35(6), 608–611 (2017)

    Google Scholar 

  15. Zhang, W., Gao, D., Li, Y.: Hidden identity ring signature scheme using ECC. Comput. Eng. Appl. 53(23), 88–90 (2017)

    Google Scholar 

  16. Li, Y.: Simple analysis of ID-based multi-party simultaneous signature scheme on ECC. Kexue yu Xinxihua (2), 35–36 (2018)

    Google Scholar 

  17. Qin, X., Xin, Y., Lu, G.: Design and implementation of digital signature system based on elliptic curve. Comput. Eng. Appl. 39(28), 151–155 (2003)

    Google Scholar 

  18. Li, X., Zhao, H., Wang, J., et al.: Improvement of ElGamal digital signature algorithm based on adding a random number. J. Northeast. Univ. (Nat. Sci. Ed.) 31(08), 1102–1104, 1112 (2010)

    Google Scholar 

  19. Zhang, X.: Digital Signature Principle and Technology, p. 95. Mechanical Industry Press, Beijing (2004)

    Google Scholar 

  20. Han, Y., Yang, X., Hu, J., et al.: Improved ECDSA signature algorithm. Comput. Sci. 30(10 Supplement), 377–378 (2003)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the grant of Science and Technology Projects of Henan Provincial Department of Education (17A520006), Science and Technology Projects of Henan Science and Technology Department (162102210047, 162102310474).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yamin Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Y., Zhang, P. (2019). Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24271-8_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24270-1

  • Online ISBN: 978-3-030-24271-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics