Main Page
About FCIT
History
Strategy
Administration>
Current Administration
Prevouis Administration
Organization Strucutre
Industrial Advisory Board
PhotoAlbum
Lab Guides
Departments
Computer Science
Information Technology
Information Systems
Academics
Bachelor Programs
Graduate Programs
Executive Programs
Academic Calendar
Admission
Bachelor Degree & Transferring
Admission from the Foundation Year
Transferring to the Faculty
Graduate Studies
Graduate Programs
Executive Programs
Scientific Research
Groups and Units
Research Groups
Research Interests
Distinguished Scientists Program
Faculty Journal
Faculty and Staff
Faculty
CS Department
IT Department
IS Department
Staff
Accreditation Integration & Management System (AIM
Development and Quality Unit
Work at FCIT
Capabilities Under the Spotlight
Code of Ethics
Students
Bachelor
ِAcademic Services
Preparatory Year Courses
Students' Guide
Academic Advising
Laboratories and Facilities
Student rights and duties
Graduate
Polices and Regulations
Students' Guide
Student's Handbook
New Student Orientation
Templates of proposals and theses for masters and
Courses
CS Program
IT Program
IS Program
Alumni Registration
Students Activities
Entrepreneurship Club
Cybersecurity Club
Data Science Club
Programming Club
Community
Industrial partnerships
Cisco Academy
Microsoft Academy
Oracle Academy
Files
Researches
Contact Us
عربي
English
About
Admission
Academic
Research and Innovations
University Life
E-Services
Search
Faculty of Computing and Information Technology
Document Details
Document Type
:
Article In Journal
Document Title
:
Personal Authentication Protocol based on ECDLP using Biometric Feature Values
بروتوكول للتحقق الشخصي يعتمد على مسألة (ECDLP) باستخدام قيم خصائص التحاليل الإحيائية
Subject
:
Cryptographic Protocols
Document Language
:
English
Abstract
:
This paper describes an efficient simple proxy blind signature scheme. The security of the scheme is based on Elliptic Curve Discrete Logarithm Problem (ECDLP). This can be implemented in low power and small processor mobile devices such as smart card, PDA etc. A proxy blind signature scheme is a special form of blind signature which allows a designated person called proxy signer to sign on behalf of two or more original signers without knowing the content of the message or document. It combines the advantages of proxy signature and blind signature scheme and satisfies the security properties of both proxy and blind signature scheme.
ISSN
:
00000000
Journal Name
:
International Journal of Computer Science and Network Security (IJCSNS), Korea
Volume
:
1
Issue Number
:
9
Publishing Year
:
2009 AH
1429 AD
Article Type
:
Article
Added Date
:
Saturday, December 24, 2011
Researchers
Researcher Name (Arabic)
Researcher Name (English)
Researcher Type
Dr Grade
Email
جبراكاش كار
Kar, Jayaprakash
Researcher
Doctorate
jayaprakashkar@yahoo.com
Files
File Name
Type
Description
31735.pdf
pdf
Personal Authentication Protocol based on ECDLP using Biometric Feature Values
Back To Researches Page