Also found in: Encyclopedia.
ECDSAElliptic Curve Digital Signature Algorithm
ECDSAExtended Cics Dynamic Storage Area
References in periodicals archive ?
Domain parameter generation: The domain parametric quantity for ECDSA consist of a appropriately chosen elliptic curve E defined over a finite field Zp of characteristic q, and a base point R [member of] Ep(x, y) with order n.
ECDSA signature generation: To sign a message m, an entity A with domain parametric quantity (q, Ep(x, y), R, n) and associated key pair (i, K) does the following:
Although ECDSA signature has been accepted as standard signature algorithm in elliptic curves, parameter U [member of] [Z.
The signature validation process of ECDSA is described as follows.
Like the design of the SM2 elliptic curve threshold signature scheme, the secret sharing algorithms introduced in section 3 are still used to design the threshold signature scheme based on ECDSA.
Another interesting result is that when the number of received messages is smaller than 8, the ECDSA scheme achieves the smallest message verification latency; however, when the number of messages is greater than 8, our scheme yields much less verification latency.
Then we compare the transmission overhead in ours and ECDSA which is adopted in [11].
The studied techniques are grouped into three categories; MAC techniques which are CBC-MAC, XMAC, CMAC, and HMAC, digital signature techniques which are RSA and ECDSA, and block cipher techniques which are AES, RC5, Skipjack, and XXTEA.
RSA [24] and ECDSA [25] are two well-known public key cryptography techniques that use two keys; private and public.