Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sattar J. Aboud is active.

Publication


Featured researches published by Sattar J. Aboud.


international conference on information technology new generations | 2008

An Efficient RSA Public Key Encryption Scheme

Sattar J. Aboud; Mohammad Ahmed Al-Fayoumi; Mustafa Al-Fayoumi; Haidar S. Jabbar

In this paper, we propose an efficient RSA public key encryption scheme, which is improved version of original RSA scheme. The proposed RSA encryption scheme is based on linear group over the ring of integer mod a composite modulus n which is the product of two distinct prime numbers. In the proposed scheme the original message and the encrypted message are h x h square matrices with entities in zn indicated via l(h, zn) . Since the original RSA Scheme is a block cipher in which the original message and cipher message are integer in the interval [0, n -1] for some integer modulus n. Therefore, in this paper, we generalize RSA encryption scheme in order to be implemented in the general linear group on the ring of integer mod n. Furthermore, the suggested encryption scheme has no restriction in encryption and decryption order and is claimed to be efficient, scalable and dynamic.


International Journal of Advanced Computer Science and Applications | 2012

Efficient Threshold Signature Scheme

Sattar J. Aboud; Mohammad Ahmed Al-Fayoumi

In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of the RSA signature modulus. Also, the signing process of the proposed scheme is more efficient in terms of time complexity and interaction.


International Journal of Advanced Computer Science and Applications | 2014

Secure Undeniable Threshold Proxy Signature Scheme

Sattar J. Aboud

the threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group to cooperatively sign message on behalf of an original signer. In this paper, we propose a new scheme which includes the features and benefits of the RSA scheme. Also, we will evaluate the security of undeniable threshold proxy signature scheme with known signers. We find that the existing threshold proxy scheme is insecure against the original signer forgery. In this paper, we show the cryptanalysis of an existed scheme. Additional, we propose the secure, undeniable and known signers threshold proxy signature scheme which answers the drawback of an existed scheme. We also demonstrate that a threshold proxy signature suffers from a conspiracy of an original signer and a secret share dealer, that the scheme is commonly forgeable, and cannot offer undeniable. We claim that the proposed scheme offers the undeniable characteristic.


The Journal of Internet Banking and Commerce | 2017

Efficient E-Tickets Fare Scheme for Time-Typed Services

Sattar J. Aboud; Moustafa Al-Fayoumi; Mohammad Ahmed Al-Fayoumi


Archive | 2010

Verification and Validation of Simulation Models

Sattar J. Aboud; Mohammad Al Fayoumi; Mohamed Alnuaimi


International Journal of Emerging Technologies in Learning (ijet) | 2007

Secure E-Test Scheme

Sattar J. Aboud


American Journal of Applied Sciences | 2007

An Adjustable Sample Size Estimation Model for Usability Assessment

Haidar S. Jabbar; T. V. Gopal; Sattar J. Aboud


2017 International Conference on New Trends in Computing Sciences (ICTCS) | 2017

An Efficient E-Coin Scheme under Elliptic Curve Cryptography

Mustafa Al-Fayoumi; Sattar J. Aboud; Mohammad Ahmed Al-Fayoumi; Jaafer Al Saraireh


The International Conference on Computing, Networking and Digital Technologies (ICCNDT2012) | 2012

PROXY SIGNATURE SCHEME FOR WARRANT PARTIAL DELEGATION

Sattar J. Aboud; Mohammad Ahmed Al-Fayoumi


International Journal of Aviation Technology, Engineering and Management (IJATEM) | 2011

Efficient Password Scheme Without Trusted Server

Sattar J. Aboud; Mohamed Alnuaimi; Haidar S. Jabbar

Collaboration


Dive into the Sattar J. Aboud's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mustafa Al-Fayoumi

Salman bin Abdulaziz University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge