A NOVEL DIGITAL SIGNATURE SCHEME BASED ON CUBIC RESIDUE WITH PROVABLE SECURITY

被引:0
|
作者
Lin, Hsiu-Feng [1 ]
Gun, Chiou-Yueh [2 ,3 ]
Chen, Chih-Ying [2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Feng Chia Univ, Dept Commun Engn, Taichung 40724, Taiwan
[3] Nan Kai Univ Technol, Dept Mech Engn, Caotun Township 54243, Nantou County, Taiwan
关键词
Cubic residue; Discrete logarithm problem with a composite modulus; Provable security; Random oracle model; IDENTIFICATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since a single computationally hard problem today may possibly be solved efficiently in the future, many researchers endeavored in recent years to base their cryptosystern security on solving two or more hard problems simultaneously to enhance the system security. However, it is found that many previously suggested signature schemes with their (1) security based on integer factorization and discrete logarithm problems and with (2) verification equation using exponential quadratic forms were not as secure as claimed and gave no provable security under the random oracle model. We, therefore, use the theory of cubic residues to present a new signature scheme with an exponential cubic verification equation to prevent the attack from Pollard-Schnorr's congruence solutions and give a formal proof of the scheme security by random oracle modeling. We formally prove that, based on solving the discrete logarithm problem with a composite modulus (which has been shown by Bach in 1984 to be exactly as hard as simultaneously solving the integer factorization and the discrete logarithm with a prime modulus), the proposed scheme is resistant against both no-message and adaptively chosen-message attacks.
引用
收藏
页码:1645 / 1663
页数:19
相关论文
共 50 条
  • [1] A Short Certificate-based Signature Scheme with Provable Security
    Hung, Ying-Hao
    Huang, Sen-Shan
    Tseng, Yuh-Min
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 243 - 253
  • [2] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [3] Efficient Certificateless Signature Scheme with Provable Security
    Gayathri, N. B.
    Reddy, P. Vasudeva
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 539 - 544
  • [4] Comment on "An efficient identity-based signature scheme with provable security"
    Tan, Syh-Yuan
    Heng, Swee-Huay
    INFORMATION SCIENCES, 2024, 659
  • [5] An efficient anonymous proxy signature scheme with provable security
    Yu, Yong
    Xu, Chunxiang
    Huang, Xinyi
    Mu, Yi
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 348 - 353
  • [6] Efficient certificateless proxy signature scheme with provable security
    Seo, Seung-Hyun
    Choi, Kyu Young
    Hwang, Jung Yeon
    Kim, Seungjoo
    INFORMATION SCIENCES, 2012, 188 : 322 - 337
  • [7] Efficient partially blind signature scheme with provable security
    Gong, Zheng
    Li, Xiangxue
    Chen, Kefei
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2006, 4112 : 378 - 386
  • [8] A certificateless proxy ring signature scheme with provable security
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    International Journal of Network Security, 2011, 12 (02) : 92 - 106
  • [9] An efficient provable security identity-based proxy aggregate signature scheme
    Guo, Lei
    Hu, Defa
    International Journal of Applied Mathematics and Statistics, 2013, 51 (23): : 212 - 222
  • [10] An Identity-Based Blind Signature Scheme Using Lattice with Provable Security
    Li, Quanrun
    Hsu, Chingfang
    He, Debiao
    Choo, Kim-Kwang Raymond
    Gong, Peng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020