Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 3 of 3
  • Item
    Bad signature identification in a batch using error detection codes
    (Springer Verlag service@springer.de, 2019) Kittur, A.S.; Kauthale, S.; Pais, A.R.
    In today’s digital communication world, authentication of data and the sender is very important before processing. Digital Signatures are the best way for verifying the authenticity of the message or document. When multiple signatures need to be verified together, we use batch signature verification. There are multiple batch verification algorithms for various digital signature schemes such as ECDSA, RSA, DSS and others. Most of the batch verification techniques fail to locate the position of the invalid signature/s in a batch. Hence there are multiple bad signature identification algorithms available to locate the bad signatures. The existing algorithms are inefficient in identifying position of bad signature, if the number of bad signatures increases in the batch or if the number of bad signatures are not known before verification. Hence such schemes are practically not suitable for real time environment. Our proposed CRC based verifier scheme overcomes these disadvantages, as well as outperforms the existing schemes in efficiently identifying the bad signature/s. The comparative analysis of the proposed scheme and the existing schemes, is also discussed in the paper. © Springer Nature Singapore Pte Ltd. 2019.
  • Item
    Undeniable Signature Scheme: A Survey
    (Institute of Electrical and Electronics Engineers Inc., 2020) Kale, P.; Hazarika, P.; Chandavarkar, B.R.
    Nowadays, almost all business organizations, committees use the internet to do transactions and confidential information exchange. So it is crucial to make these transactions secure and reliable. A system to be confident and trustworthy needs a function of cryptography, and also it must manage the keys of cryptography. The digital signature, which is universally verifiable, is a solution when there are disputes between the sender and receiver. Later the undeniable signature scheme was introduced as a modern technique to verify the validity of a message sent by the sender. The undeniable signature scheme has its properties to protect the interests of the sender and receiver. An authenticated verifier only can check the signature with the approval of the signer. In this paper, we have discussed various undeniable signature schemes-key generation, signature verification, and disavowal protocol. This paper compares different schemes of the undeniable signature on the various notations of security. © 2020 IEEE.
  • Item
    Ways of Connecting Illiterates with the Security Mechanism: Case Study
    (Springer Science and Business Media Deutschland GmbH info@springer-sbm.com, 2021) Kumar, S.R.; Sonkar, M.; Chandavarkar, B.R.
    The digital communication faces lots of security threats and attacks in the network. Thus, security mechanisms are used as a measure to ensure safety and to implement the security services for the text documents, audio, video and other types of data communication over the network. These security mechanisms are helpful to recognise, prevent and recover from security breaches, threats and attacks. Some of the security mechanisms are Cryptography, Public key certification, Authentication, Digital signatures etc. Obviously, these are mostly used by educated people in communication for their data to be remain integrated, confidential and safe. But, a bitter fact is that there are 30.90% people who are illiterate and have no education background living in our country and their data is also very important to them. So, we have to connect those illiterate people to these security mechanisms, so that they can also communicate without being in fear of the data loss or data manipulation. There are many ways to connect illiterate people with the security mechanisms such as by using facial recognition and fingerprint as the password in various systems or machines like ATMs, banks, government offices and also provide information and knowledge about the prevention from the possible fraud, theft and malicious activities. This paper discuss those different ways to connect the illiterate people with security mechanisms and enlighten their lives. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.