Contract Signing Protocol Based on RSA Signature
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 7
Abstract
A reasonable contract-marking convention permits two conceivably doubted equalities to trade their responsibilities to a concurred contract over the Internet in a reasonable manner, so that either each of them acquires the other's signature or neither one of the parties does. Taking into account the RSA mark conspire, another advanced contract-marking convention is proposed in this paper. Like the current RSA-based answers for the same issue, the convention is reasonable, as well as idealistic, since the trusted outsider is included just in the circumstances where one gathering is swindling or the correspondence channel is intruded. Besides, the proposed convention fulfills new property illuse freeness. That is, if the convention is executed unsuccessfully, none of the two gatherings can demonstrate the legitimacy of middle of the road results to others. This misuse free reasonable contract marking convention in view of the RSA mark gives both security and effectiveness.
Authors and Affiliations
Sheetal M Rao, Asst Prof Varsha Vaidya
Computational Performances of OFDM using Different Pruned Radix FFT Algorithms
The Fast Fourier Transform (FFT) and its inverse (IFFT) are very important algorithms in signal processing, software-defined radio, and the most promising modulation technique i.e. Orthogonal Frequency Division Multiple...
LED Based Energy Efficient Wireless Street Light Control and Monitoring System
Lighting systems, particularly within the public sector, are still designed per the previous standards of reliability and that they don't usually profit of latest technological developments. Use of renewable energy sour...
A Glimpse of Ransomware
Ransomware has become one of the most widespread and damaging threats that internet users face. So basically it is a data kidnapper. It kidnaps your data and demands money from you. In this paper I have put down regardi...
A Study On Near Data Processing
This paper helps to understand the basics of Near Data Processing. Systems accessing big data need huge memory storage which results in quality less performance and high cost hence the term Near Data Processing emerged....
A Survey on Privacy Preserving in Authentication Protocol for Shared Authority Based Cloud Computing
Cloud computing is rising as a prevailing information interactive paradigm to appreciate users information remotely keep in an internet cloud server. Cloud services offer nice conveniences for the users to fancy the on-...