Conventional and Improved Digital Signature Scheme: A Comparative Study


Due to the rapid growth of online transactions on the Internet, authentication, non-repudiation and integrity are very essential security requirements for a secure transaction. To achieve these security goals, digital signature is the most efficient cryptographic primitive. Many authors have proposed this scheme and prove their security and evaluate the efficiency. In our paper, we present comprehensive study of conventional digital signature schemes based on RSA, DSA and ECDSA (Elliptic Curve Digital Signature Algorithm) and the improved version of these scheme.

Share and Cite:

Alrehily, A. , Alotaibi, A. , Almutairy, S. , Alqhtani, M. and Kar, J. (2015) Conventional and Improved Digital Signature Scheme: A Comparative Study. Journal of Information Security, 6, 59-67. doi: 10.4236/jis.2015.61007.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Roy, A. and Karforma, S. (2012) A Survey on Digital Signatures and Its Applications. Journal of Computer and Information Technology, 3, 45-69.
[2] Pallipamu, V., Reddy T.K. and Varma, S.P. (2014) A Survey on Digital Signatures. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 3, 7243-7246.
[3] Lin, I.C. and Chang, C.C. (2007) Security Enhancement for Digital Signature Schemes with Fault Tolerance in RSA. Information Sciences, 177, 4031-4039.
[4] Kar, J. (2012) Provably Secure Identity-Based Aggregate Signature Scheme. IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2012), Cyber Security and Privacy, Sanya, 10-12 October 2012, 137-142.
[5] Lin, I.C. and Wang, H.L. (2010) An Improved Digital Signature Scheme with Fault Tolerance in RSA. 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, 15-17 October 2010, 9-12.
[6] Xue, H. (2010) Improving the Fault-Tolerant Scheme Based on the RSA System. International Symposium on Computational Intelligence and Design, Hangzhou, 29-31 October 2010, 31-33.
[7] Hairong, Z., Rong, L., Lingl, L. and Ying, D. (2013) Improved Speed Digital Signature Algorithm Based on Modular Inverse. International Conference on Measurement, Information and Control, Harbin, 16-18 August 2013, 706-710.
[8] Han, G., Ma, C. and Cheng, Q. (2010) A Generalization of DSA Based on the Conjugacy Search Problem. International Workshop on Education Technology and Computer Science, 3, 348-351.
[9] Kar, J. (2014) Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, 16, 26-36.
[10] Junru, H. (2011) The Improved Elliptic Curve Digital Signature Algorithm. International Conference on Electronic & Mechanical Engineering and Information Technology, Harbin, 12-14 August 2011, 257-259.
[11] Li, H., Zhang, R., Yi, J. and Lv, H. (2013) A Novel Algorithm for Scalar Multiplication in ECDSA. 5th International Conference on Computational and Information Sciences, Shiyang, 21-23 June 2013, 943-946.
[12] Lamba, S. and Sharma, M. (2013) An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA). International Conference on Machine Intelligence Research and Advancement, Katra, 21-23 December 2013, 179-183.
[13] Kar, J. (2014) Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-04, 67-88.
[14] Kar, J. (2014) A Novel Construction of Certificateless Signcryption Scheme for Smart Card. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-22, 437-456.
[15] Si, H., Cai, Y. and Cheng, Z. (2010) An improved RSA signature algorithm based on complex numeric operation function. International Conference on Challenges in Environmental Science and Computer Engineering, Wuhan, 6-7 March 2010, 397-400.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.