2022
DOI: 10.1155/2022/1977798
|View full text |Cite
|
Sign up to set email alerts
|

An ECC-Based Digital Signature Scheme for Privacy Protection in Wireless Communication Network

Abstract: Aiming at the security problems of wireless communication network and the shortcomings of Elliptic Curve Digital Signature Algorithm (ECDSA), this paper designed a forward secure digital signature scheme and proved that the scheme has forward security and unforgeability in the random oracle model. Experimental simulations are done in this paper, and the results show that the proposed scheme has the highest efficiency compared with the ECDSA scheme and the three existing forward secure schemes. This scheme not … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(18 citation statements)
references
References 23 publications
0
1
0
Order By: Relevance
“…), and elliptic curve multiplication (E CM) in the proposed scheme and those of Kim et al [21], Oh et al [22], Ko et al [23], and Zhang et al [26], respectively. The comparative outcomes are presented in Table 2, based on major operations in the proposed scheme and those of Kim et al [21], Oh et al [22], Ko et al [23], and Zhang et al [26].…”
Section: Correctnessmentioning
confidence: 96%
See 3 more Smart Citations
“…), and elliptic curve multiplication (E CM) in the proposed scheme and those of Kim et al [21], Oh et al [22], Ko et al [23], and Zhang et al [26], respectively. The comparative outcomes are presented in Table 2, based on major operations in the proposed scheme and those of Kim et al [21], Oh et al [22], Ko et al [23], and Zhang et al [26].…”
Section: Correctnessmentioning
confidence: 96%
“…), and elliptic curve multiplication (E CM) in the proposed scheme and those of Kim et al [21], Oh et al [22], Ko et al [23], and Zhang et al [26], respectively. The comparative outcomes are presented in Table 2, based on major operations in the proposed scheme and those of Kim et al [21], Oh et al [22], Ko et al [23], and Zhang et al [26]. The analysis based on time in milliseconds (ms) is included in Table 3, between Kim et al [21], Oh et al [22], Ko et al [23], and Zhang et al [26], and the proposed scheme.…”
Section: Correctnessmentioning
confidence: 96%
See 2 more Smart Citations
“…According to the study, the revised system is ideal for wireless communication networks, providing excellent security and efficiency. Recent work concentrate on implementing the system in real-world wireless communication network environments [31].…”
Section: Literature Surveymentioning
confidence: 99%