Welcome to Francis Academic Press

International Journal of Frontiers in Engineering Technology, 2023, 5(12); doi: 10.25236/IJFET.2023.051218.

Design of information integrity scheme in smartphone forensics


Yu Hanbing

Corresponding Author:
Yu Hanbing

Leshan Vocational and Technical College, Leshan, Sichuan, China


The vulnerability of electronic data itself makes the originality of digital forensic information become the key to the process of computer evidence identification. Based on smartphone forensics, using the ECDSA signature mechanism, this paper puts forward an anti-repudiation scheme to prove the integrity of electronic evidence. The scheme can transfer the obtained forensics information in real-time and safely during the operation of the smartphone system, and fix the evidence to ensure its integrity. On the premise of some cryptographic assumptions, the security of the scheme is proved.


smartphone forensics; Information consistency; ECDSA signature; non-repudiation

Cite This Paper

Yu Hanbing. Design of information integrity scheme in smartphone forensics. International Journal of Frontiers in Engineering Technology (2023), Vol. 5, Issue 12: 118-121. https://doi.org/10.25236/IJFET.2023.051218.


[1] Chen Long, Mai Yonghao, Huang Chuanhe. Computer Forensic Technology [M]. Wuhan: Wuhan University Press, 2007

[2] Ding Liping, Wang Yongji. Research on legal and Technical Issues related to computer forensics [J]. Journal of Software, 2005, 16(2): 260-275.

[3] Liu Jiqiang, Han Zhen, Lan Zengwei. Secure Audit Logs Server to Support Computer Forensics in Criminal Investigations[C]// 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering Proceedings. Beijing: People's Posts and Telecommunications Publishing House, 2002: 220-223

[4] Sham Ira. How to share a secret[J]. Communication of the ACM, 1979,22(11):612-613.

[5] National Institute of Standards and Technology (NIST). FIPS PUB 180 Secure Hash Standard[S]. 1993.