Game Optimization for RSA Signature Scheme

被引:0
|
作者
Wang Yi-chuan [1 ]
Ma Jian-feng [1 ]
Lu Di [1 ]
Zhang Liu-mei [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
关键词
Game Theory; RSA; Signature; Re-keying;
D O I
10.4028/www.scientific.net/AMM.513-517.969
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Security and efficiency for using RSA signature scheme are critical requirements for many network applications. In this paper, we present a Game Model for RSA Signature Scheme (GMRS). By analyzing our model with information and game theory, we prove that the Nash-equilibrium is existent in GMRS. Accordingly, we propose an optimization scheme for updating the private key. The experiment result shows that, our scheme can significant promote the efficiency and ensure the security, even in the lowest risk-level case and for an adversary with unlimited computing power.
引用
收藏
页码:969 / 972
页数:4
相关论文
共 50 条
  • [31] Fast rebalanced RSA signature scheme with typical prime generation
    Gyu-Chol, Kim
    Su-Chol, Li
    Hak-Chol, Hwang
    THEORETICAL COMPUTER SCIENCE, 2020, 830 : 1 - 19
  • [32] An RSA Based Certificateless Signature Scheme for Wireless Sensor Networks
    Singh, Jitendra
    Kumar, Vimal
    Kumar, Rakesh
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 443 - 447
  • [33] A modified and practical threshold proxy signature scheme based on RSA
    Geng Yong-Jun
    Tian Hui
    Hong Fan
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1958 - +
  • [34] Forward Secure Identity-Based Signature Scheme with RSA
    Ko, Hankyung
    Jeong, Gweonho
    Kim, Jongho
    Kim, Jihye
    Oh, Hyunok
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 314 - 327
  • [35] An Efficient Scheme based on DLP and RSA for Proxy Group Signature
    Nakum, Bhavesh
    Desai, Urmi
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [36] The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme
    Bellare, M
    Namprempre, C
    Pointcheval, D
    Semanko, M
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2002, 2339 : 319 - 338
  • [37] Improvement of threshold RSA signature scheme based on Chinese Remainder Theorem
    Xu, Fu
    Ma, Jing-Jin
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (10): : 2495 - 2500
  • [38] A Strongly Unforgeable: RSA Certificate less Signature Scheme for Healthcare System
    Sagar, Lalit Kumar
    Gupta, Sandeep Kumar
    Kumar, Vimal
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 6918 - 6930
  • [39] An Efficient Synchronized Aggregate Signature Scheme From Standard RSA Assumption
    Quo, Xinshun
    Wang, Zhiwei
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2014, 7 (03): : 229 - 240
  • [40] IDENTITY-BASED SEQUENTIAL AGGREGATE SIGNATURE SCHEME BASED ON RSA
    Dou, Bennian
    Chen, Chun-Hua
    Zhang, Hong
    Xu, Chungen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (09): : 6401 - 6413