Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

Authors

  • Sharma S Department of Computer Science, JSS Academy of Technical Education, Noida, India

Keywords:

Digital Signatures, Arbitrary precision numbers, Secret sharing scheme using visual cryptography

Abstract

The digital signature system is more powerful than the authentication systems, because the digital signatures support both authentication and non-repudiation. Non-repudiation is necessary for the applications like electronic commerce, digital cash, banking applications, electronic voting etc. Here an efficient scheme based on RSA and arbitrary – precision numbers is discussed which is very secure. Also a secret sharing scheme is discussed which is based on visual cryptography. If the private key of users are compromised then intruder can use it illegitimately for signing purpose. So here the ways has been proposed to increase security of digital signatures by using combination of public key cryptography and secret sharing technique.

References

ITU-T Recommendation X.509, ISO/IEC 9594-8, Information Technology - Open Systems Interconnection - The Directory: Authentication Framework, 1993.

S.R Subramanyam and Byung K.Yi, ”Digital Signatures”, IEEE, April 2006.

Alexander W.Dent , “Choosing key sizes for cryptography”, Elsevier Ltd. , University Of London, Royal Holloway, UK, 2010, pp.21-27.

William Stallings “Network Security Essentials (Applications and Standards)”, Pearson Education,2004.

R.L. Rivest ,A. Shamir, L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM ,1978, pp. 120–126.

Digital security standard, federal information processing standard publication, available at http://dx.doi.org/10.6028/nist.fips.186-4,issue July 2013.

Kai Wang et al.,”A multiple secret sharing scheme based on matrix projection”,Proceedings of 33rd annual IEEE international computer software and applications conference,U.S.A,2009,pp.400-405.

A.Shamir,”How to share a secret”,Communication of ACM,vol.22,1979,pp-612-613.

Li Bai and Xukai Zou,”A proactive secret sharing scheme in matrix projection method”,International Journal of Security and Networks,vol.4,2009,pp.201-209.

Moni Naor and Adi Shamir ,Visual Criptography, Eurocrypt 94.

Downloads

Published

2025-11-11

How to Cite

[1]
S. Sharma, “Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme”, Int. J. Comp. Sci. Eng., vol. 4, no. 3, pp. 111–115, Nov. 2025.

Issue

Section

Research Article