A digital signature scheme based on general Chebyshev polynomialA digital signature scheme based on general Chebyshev polynomialS. Li et al.

被引:0
|
作者
Shouliang Li [1 ]
Rudong Min [1 ]
Jilong Zhang [1 ]
Jiale Han [1 ]
Yulin Shen [2 ]
Zhen Yang [1 ]
Yi Yang [1 ]
机构
[1] Lanzhou University,School of Information Science and Engineering
[2] Gansu Computing Center,undefined
关键词
Chaotic system; General Chebyshev polynomial; Semigroup property; Digital signature;
D O I
10.1007/s11227-025-07074-4
中图分类号
学科分类号
摘要
Despite the operational efficiency and lower computational costs of public key cryptography based on the Chebyshev polynomial compared to elliptic curve cryptography (ECC), the digital signature schemes based on the Chebyshev polynomial have not been widely applied. The primary obstacle includes its short period characteristic and coefficient fixation issue, which makes cryptosystems vulnerable to exhaustive attacks. To enhance the resistance of cryptosystems to the exhaustive attack, the general Chebyshev polynomial (GCP) is developed in this paper. It still possesses the semigroup property that public key cryptosystems rely on and provides an optional parameter that improves its complexity and pluralism. A novel digital signature scheme with reduced design complexity and enhanced security based on GCP is proposed. Theoretical analyses and experimental results show that this digital signature scheme offers more advantages in terms of both security and efficiency than existing schemes.
引用
收藏
相关论文
共 50 条
  • [21] A new digital signature scheme based on chaotic maps
    Chain, Kai
    Kuo, Wen-Chung
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1003 - 1012
  • [22] Digital Signature Scheme Based on a New Hard Problem
    Moldovyan, Nikolay A.
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2008, 16 (02) : 163 - 182
  • [23] NEW DIGITAL SIGNATURE SCHEME BASED ON DISCRETE LOGARITHM
    YEN, SM
    LAIH, CS
    ELECTRONICS LETTERS, 1993, 29 (12) : 1120 - 1121
  • [24] Digital Signature Scheme Based on Two Hard Problems
    Wei, Shimin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (12): : 207 - 209
  • [25] A new key exchange scheme based on Chebyshev polynomials
    Wang Dahu
    Yang Haizhu
    Yu Fashan
    Wang Xudong
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 124 - 127
  • [26] New image authentication scheme based on digital signature
    Liu, BF
    Zhang, WJ
    Yu, SY
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, : 302 - 307
  • [27] A digital secure image communication scheme based on the chaotic Chebyshev map
    Liao, XF
    Li, XM
    Pen, J
    Chen, GR
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2004, 17 (05) : 437 - 445
  • [28] Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm
    Peng C.
    Luo M.
    He D.
    Huang X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2278 - 2286
  • [29] On the security of Miyaji et al. group signature scheme
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 1373 - 1382
  • [30] An attack on libert et al.'s ID-based undeniable signature scheme
    Li, Zichen
    Chong, C.F.
    Hui, Lucas Chi-Kwong
    Yiu, Siu-Ming
    Chow, K.P.
    Tsang, Wai-Wan
    Chan, H.W.
    Pun, Kelvin K. H
    International Journal of Network Security, 2007, 5 (02) : 220 - 223