Nedal Tahat
The Hashemite University

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

Identity-based threshold group signature scheme based on multiple hard number theoretic problems Nedal Tahat; Ashraf A. Tahat
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (863.463 KB) | DOI: 10.11591/ijece.v10i4.pp3695-3701

Abstract

We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is based on a pair of intractable problems, residuosity and discrete logarithm. This technique relies on two difficult problems and offers an improved level of security relative to an individual hard problem. The majority of the denoted IBTHS techniques are established on an individual difficult problem. Despite the fact that these methods are secure, however, a prospective solution of this sole problem by an adversary will enable him/her to recover the entire private data together with secret keys and configuration values of the associated scheme. Our technique is immune to the four most familiar attack types in relation to the signature schemes. Enhanced performance of our proposed technique is verified in terms of minimum cost of computations required by both of the signing algorithm and the verifying algorithm in addition to immunity to attacks.
A new digital signature scheme with message recovery using hybrid problems Nedal Tahat; Rania Shaqboua; Emad E. Abdallah; Mohammad Bsoul; Wasfi Shatanawi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (506.805 KB) | DOI: 10.11591/ijece.v9i5.pp3576-3583

Abstract

We present a new digital signature scheme with message recovery and its authenticated encryption based on elliptic curve discrete logarithm and quadratic residue. The main idea is to provide a higher level of security than all other techniques that use signatures with single hard problem including factoring, discrete logarithm, residuosity, or elliptic curves. The proposed digital signature schemes do not involve any modular exponentiation operations that leave no gap for attackers. The security analysis demonstrates the improved performance of the proposed schemes in comparison with existing techniques in terms of the ability to resist the most common attacks
A new RSA public key encryption scheme with chaotic maps Nedal Tahat; Ashraf A. Tahat; Maysam Abu-Dalu; Ramzi B. Albadarneh; Alaa E. Abdallah; Obaida M. Al-Hazaimeh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (782.575 KB) | DOI: 10.11591/ijece.v10i2.pp1430-1437

Abstract

Public key cryptography has received great attention in the field of information exchange through insecure channels. In this paper, we combine the Dependent-RSA (DRSA) and chaotic maps (CM) to get a new secure cryptosystem, which depends on both integer factorization and chaotic maps discrete logarithm (CMDL). Using this new system, the scammer has to go through two levels of reverse engineering, concurrently, so as to perform the recovery of original text from the cipher-text has been received. Thus, this new system is supposed to be more sophisticated and more secure than other systems. We prove that our new cryptosystem does not increase the overhead in performing the encryption process or the decryption process considering that it requires minimum operations in both. We show that this new cryptosystem is more efficient in terms of performance compared with other encryption systems, which makes it more suitable for nodes with limited computational ability.
Numerical approach of riemann-liouville fractional derivative operator Ramzi B. Albadarneh; Iqbal M. Batiha; Ahmad Adwai; Nedal Tahat; A. K. Alomari
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp5367-5378

Abstract

This article introduces some new straightforward and yet powerful formulas in the form of series solutions together with their residual errors for approximating the Riemann-Liouville fractional derivative operator. These formulas are derived by utilizing some of forthright computations, and by utilizing the so-called weighted mean value theorem (WMVT). Undoubtedly, such formulas will be extremely useful in establishing new approaches for several solutions of both linear and nonlinear fractionalorder differential equations. This assertion is confirmed by addressing several linear and nonlinear problems that illustrate the effectiveness and the practicability of the gained findings.
Analytical solutions of linear and non-linear incommensurate fractional-order coupled systems Ramzi B. Albadarneh; Iqbal M. Batiha; Nedal Tahat; Abdel-Kareem N. Alomar
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp776-790

Abstract

In this paper, a new analytical method is developed for solving linear and non-linear fractional-order coupled systems of incommensurate orders. The system consists of two fractional-order differential equations of orders . The proposed approach is performed by decoupling the system into two fractional-order differential equations; the first one is a fractional-order differential equation (FoDE) of one variable of order , while the second one depends on the solution of the first one. The general solution of the coupled system is obtained using the adomian decomposition method (ADM). The main ideas of this work are verified via several examples of linear and nonlinear systems, and the numerical simulations are performed using Mathematica.