Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/53379
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChin, Yee Kwan.
dc.date.accessioned2013-06-03T02:11:06Z
dc.date.available2013-06-03T02:11:06Z
dc.date.copyright2013en_US
dc.date.issued2013
dc.identifier.urihttp://hdl.handle.net/10356/53379
dc.description.abstractA proxy signature allows delegation of an owner’s signature to other parties to allow him/them to represent him/her. Given such delegation, traceability of the party representing the owner is important to maintain accountability over party actions. Also, the delegation process has to be sound and complete against forgery. By using elliptical curve cryptosystems, a proxy signature can be providing optimal security. Elliptical curve cryptosystems provide same level of security with a smaller key size compared to conventional cryptosystems. This report would summarize what have been done in this project including design and implementation of proxy signature schemes over elliptical curve computation.en_US
dc.format.extent54 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University
dc.subjectDRNTU::Engineeringen_US
dc.titleProxy signature distribution scheme over elliptic curve computation in a networken_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorMa Maodeen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineeringen_US
item.grantfulltextrestricted-
item.fulltextWith Fulltext-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
ChinYeeKwan.pdf
  Restricted Access
1.16 MBAdobe PDFView/Open

Page view(s)

380
Updated on Jul 18, 2024

Download(s)

5
Updated on Jul 18, 2024

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.