Abstract
Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm (ECDSA) has been applied to wireless networks because of its low computational cost and short key size, which reduces the overheads in a wireless environment. This study improves the ECDSA scheme by reducing its time complexity. The significant advantage of the algorithm is that our new scheme needs not to calculate modular inverse operation in the phases of signature generation and signature verification. Such an improvement makes the proposed scheme more efficient and secure.
Similar content being viewed by others
References
Menezes A, Vanstone S, Oorschot V.Handbook of Applied Cryptography[M]. Boca Raton: CRC Press, 2001: 283–320.
Rivest R, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public Key Cryptosystems[J].Communications of the ACM, 1978,21(2):120–126.
Koblitz N.A Course in Number Theory and Cryptography [M]. New York: Springer-Verlag, 1994: 167–191.
Nicholas J, Brandon A. Performance Comparison of Elliptic Curve and RSA Digital Signatures[EB/OL]. [2005-09-01].http://www.nicj.net/files/498termpaper.pfd.
Johnson D, Menezes A, Vanstone S. The Elliptic Curve Digital Signature Algorithm (ECDSA) [J].International Journal on Information Security, 2001,1(1): 36–63.
Koblitz N, Menezes A, Vanstone S. The State of Elliptic Curve Cryptography [J].Designs Codes and Cryptography, 2000,19: 173–193.
Lawrence C.Elliptic Curves: Number Theory and Cryptography[M]. Boca Raton: CRC Press, 2003: 9–59.
Jurisic A, Menezes A. Elliptic Curves and Cryptography [EB/OL]. [2003-04-02].http://www.certicom. com/whitepapers.
Blake I, Seroussi G, Smart N.Elliptic Curves in Cryptography[M]. Cambridge: Cambridge University Press, 1999: 57–76.
Menezes A, Okamoto T, Vastone S. Reducing Elliptic Curve Logarithms to a Finite Field [J].IEEE Trans Info Theory, 1983,39: 1636–1646.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the Science Foundation of Aeronautics (05F53029) and Graduate Starting Seed Fund of Northwestern Polytechnical, University (Z200633)
Biography: XU Zhong (1979-), male, Ph. D. candidate, research direction: information security, Ad hoc networks.
Rights and permissions
About this article
Cite this article
Zhong, X., Guanzhong, D. & Deming, Y. An efficient ECDSA-based signature scheme for wireless networks. Wuhan Univ. J. Nat. Sci. 11, 1707–1710 (2006). https://doi.org/10.1007/BF02831856
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831856