2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) 2021
DOI: 10.1109/iemtronics52119.2021.9422589
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of an Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…[28][29][30][31][32][33][34] The usage of identity-based encryption 42 and blockchain-based methods together is planned. In addition, it is also considered to be used in blockchain-based applications with ECDSA, 43 which is a digital signature method that has become popular recently. At the same time, research is being conducted for blockchain-based applications in connected vehicles 44 and IoT.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…[28][29][30][31][32][33][34] The usage of identity-based encryption 42 and blockchain-based methods together is planned. In addition, it is also considered to be used in blockchain-based applications with ECDSA, 43 which is a digital signature method that has become popular recently. At the same time, research is being conducted for blockchain-based applications in connected vehicles 44 and IoT.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…Firstly, the receiver checks the value r 1 from the signature of the first transaction tx 1 as the x-coordinate to find the point X on the elliptic curve. This point can also be obtained during the process of verifying the validity of the ECDSA signature [21]. Secondly, the receiver uses the deterministic function map ′ with inputs X and h 2 to derive the random number k 2 chose by the sender to sign the second transaction tx 2 .…”
Section: Kleptography On Ecdsamentioning
confidence: 99%
“…Inversion operation could also be costly as it is used in both signature generation and signature verification. Genç and Afacan [3] implement ECDSA with reduced inversion operations by moving the inversion operation into the key pair generation. That is, replace R = kG with R = (k -1 mod n)G. Moreover, s in the signature generation is replaced as s = d(t -h) mod n. Inversion operations in w 1 and w 2 in signature verification is removed.…”
Section: Implementation Issues In Ecdsamentioning
confidence: 99%
“…The author implemented the ECDSA function in python. The paper also explains the hash function, Elliptic Curve Cryptography (ECC), Elliptic curve discrete logarithm problem (ECDLP) and key pair generation in ECDSA [3]. In the paper Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves, ECDSA's hardware implementation based on Koblitz subfield curves with a key length of 163-bit is introduced.…”
Section: Introductionmentioning
confidence: 99%