Abstract
In this paper, two ECDSA (Elliptic Curve Digital Signature Algorithm) protocols are newly proposed for authentication. Each protocol describes the process of key generation, signature generation and signature verification. Two protocols described here are based on quadratic residue method and subgroup method. Both are used for authentication purpose. In each set up, complexities are involved in the process of signature generation and verification. Further, each one is different from DSA protocol.