A digital signature scheme based on general Chebyshev polynomialA digital signature scheme based on general Chebyshev polynomialS. Li et al.

被引:0
|
作者
Shouliang Li [1 ]
Rudong Min [1 ]
Jilong Zhang [1 ]
Jiale Han [1 ]
Yulin Shen [2 ]
Zhen Yang [1 ]
Yi Yang [1 ]
机构
[1] Lanzhou University,School of Information Science and Engineering
[2] Gansu Computing Center,undefined
关键词
Chaotic system; General Chebyshev polynomial; Semigroup property; Digital signature;
D O I
10.1007/s11227-025-07074-4
中图分类号
学科分类号
摘要
Despite the operational efficiency and lower computational costs of public key cryptography based on the Chebyshev polynomial compared to elliptic curve cryptography (ECC), the digital signature schemes based on the Chebyshev polynomial have not been widely applied. The primary obstacle includes its short period characteristic and coefficient fixation issue, which makes cryptosystems vulnerable to exhaustive attacks. To enhance the resistance of cryptosystems to the exhaustive attack, the general Chebyshev polynomial (GCP) is developed in this paper. It still possesses the semigroup property that public key cryptosystems rely on and provides an optional parameter that improves its complexity and pluralism. A novel digital signature scheme with reduced design complexity and enhanced security based on GCP is proposed. Theoretical analyses and experimental results show that this digital signature scheme offers more advantages in terms of both security and efficiency than existing schemes.
引用
收藏
相关论文
共 50 条
  • [31] Attack on libert et al.'s ID-based undeniable signature scheme
    Department of Information Security, Beijing Eelctronic Science and Technology Institute, Beijing 100070, China
    不详
    不详
    Chin J Electron, 2008, 4 (748-750):
  • [32] Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme
    Park, Chanhyeok
    Cho, Sangrae
    Cho, Young-Seob
    Kim, Soohyung
    Lee, Hyung Tae
    IEEE ACCESS, 2024, 12 : 16462 - 16473
  • [33] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04): : 748 - 750
  • [34] A practical digital signature scheme based on the hidden logarithm problem
    Moldovyan, D. N.
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2021, 29 (02) : 206 - 226
  • [35] Identity-Based Digital Signature Scheme with Forward Security
    Tang Lei
    Liu Yali
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 290 - 293
  • [36] A Digital Signature Scheme Based on MST3 Cryptosystems
    Hong, Haibo
    Li, Jing
    Wang, Licheng
    Yang, Yixian
    Niu, Xinxin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [37] Security of digital signature scheme based on factoring and discrete logarithms
    Chang, CC
    Chang, YF
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 331 - 332
  • [39] Easy Simple Factoring-based Digital Signature Scheme
    Hue, Sook-Yan
    Sarmin, Nor Haniza
    Ismail, Eddie Shahril
    Chin, Ji-Jian
    INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST-2020), 2020, : 91 - 94
  • [40] Sequential Digital Multi-Signature Scheme Based on NTRU
    Gao, Yongguo
    Yin, Xinxin
    Hao, Cheng
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 236 - 240