Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChin, Yee Kwan.
dc.description.abstractA proxy signature allows delegation of an owner’s signature to other parties to allow him/them to represent him/her. Given such delegation, traceability of the party representing the owner is important to maintain accountability over party actions. Also, the delegation process has to be sound and complete against forgery. By using elliptical curve cryptosystems, a proxy signature can be providing optimal security. Elliptical curve cryptosystems provide same level of security with a smaller key size compared to conventional cryptosystems. This report would summarize what have been done in this project including design and implementation of proxy signature schemes over elliptical curve computation.en_US
dc.format.extent54 p.en_US
dc.rightsNanyang Technological University
dc.titleProxy signature distribution scheme over elliptic curve computation in a networken_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorMa Maodeen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineeringen_US
item.fulltextWith Fulltext-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
  Restricted Access
1.16 MBAdobe PDFView/Open

Page view(s)

Updated on Jul 18, 2024


Updated on Jul 18, 2024

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.