Skip to main content

2013 | OriginalPaper | Buchkapitel

Digital Signature Schemes from Two Hard Problems

verfasst von : Binh V. Do, Minh H. Nguyen, Nikolay A. Moldovyan

Erschienen in: Multimedia and Ubiquitous Engineering

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose two new signature schemes and a novel short signature scheme from two hard problems. The proposed schemes have two prominent advantages. Firstly, they are developed from some signature schemes where the security and efficiency have been proven. Therefore, they inherit these properties from the previous schemes. Secondly, the security of the proposed schemes is based on two hard problems. Therefore, they are still safe even when cryptanalysis has an effective algorithm to solve one of these problems, but not both. Moreover, we also propose a method for reducing signatures and this is the first attempt to reduce signatures based on two hard problems. Therefore, our proposed schemes are suitable for the applications requiring long-term security in resource limited systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca RatonCrossRef Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca RatonCrossRef
2.
Zurück zum Zitat Pieprzyk J, Hardjono T, Seberry J (2003) Fundamentals of computer security. Springer, New YorkCrossRefMATH Pieprzyk J, Hardjono T, Seberry J (2003) Fundamentals of computer security. Springer, New YorkCrossRefMATH
3.
Zurück zum Zitat Harn L (1994) Public-key cryptosystem design based on factoring and discrete logarithms. IEEE Proc Comput Digit Tech 141(3):193–195CrossRefMATH Harn L (1994) Public-key cryptosystem design based on factoring and discrete logarithms. IEEE Proc Comput Digit Tech 141(3):193–195CrossRefMATH
4.
Zurück zum Zitat Tzeng SF, Yang CY, Hwang MS (2004) A new digital signature scheme based on factoring and discrete logarithms. Int J Comput Math 81(1):9–14CrossRefMATHMathSciNet Tzeng SF, Yang CY, Hwang MS (2004) A new digital signature scheme based on factoring and discrete logarithms. Int J Comput Math 81(1):9–14CrossRefMATHMathSciNet
5.
Zurück zum Zitat Ismail ES, Tahat NMF (2011) A new signature scheme based on multiple hard number theoretic problems. ISRN Commun Netw Ismail ES, Tahat NMF (2011) A new signature scheme based on multiple hard number theoretic problems. ISRN Commun Netw
6.
Zurück zum Zitat Li J, Xiao G (1998) Remarks on new signature scheme based on two hard problems. Electron Lett 34(25):2401–2402CrossRef Li J, Xiao G (1998) Remarks on new signature scheme based on two hard problems. Electron Lett 34(25):2401–2402CrossRef
7.
Zurück zum Zitat Chen T-H, Lee W-B, Horng G (2005) Remarks on some signature schemes based on factoring and discrete logarithms. Appl Math Comput 169:1070–1075CrossRefMATHMathSciNet Chen T-H, Lee W-B, Horng G (2005) Remarks on some signature schemes based on factoring and discrete logarithms. Appl Math Comput 169:1070–1075CrossRefMATHMathSciNet
8.
Zurück zum Zitat Buchmann J, May A, Vollmer U (2006) Perspectives for cryptographic long term security. Commun ACM 49(9):50–55CrossRef Buchmann J, May A, Vollmer U (2006) Perspectives for cryptographic long term security. Commun ACM 49(9):50–55CrossRef
9.
Zurück zum Zitat Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: ASIACRYPT ‘01, vol 2248. LNCS, pp 514–532 Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: ASIACRYPT ‘01, vol 2248. LNCS, pp 514–532
10.
Zurück zum Zitat Moldovyan NA (2009) Short signatures from difficulty of factorization problem. Int J Netw Secur 8(1):90–95 Moldovyan NA (2009) Short signatures from difficulty of factorization problem. Int J Netw Secur 8(1):90–95
11.
Zurück zum Zitat Dernova ES (2009) Information authentication protocols based on two hard problems. PhD Dissertation, St.Petersburg State Electrotechnical University. St. Petersburg, Russia Dernova ES (2009) Information authentication protocols based on two hard problems. PhD Dissertation, St.Petersburg State Electrotechnical University. St. Petersburg, Russia
Metadaten
Titel
Digital Signature Schemes from Two Hard Problems
verfasst von
Binh V. Do
Minh H. Nguyen
Nikolay A. Moldovyan
Copyright-Jahr
2013
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6738-6_100

Neuer Inhalt