A NOVEL DIGITAL SIGNATURE SCHEME BASED ON CUBIC RESIDUE WITH PROVABLE SECURITY

被引:0
|
作者
Lin, Hsiu-Feng [1 ]
Gun, Chiou-Yueh [2 ,3 ]
Chen, Chih-Ying [2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Feng Chia Univ, Dept Commun Engn, Taichung 40724, Taiwan
[3] Nan Kai Univ Technol, Dept Mech Engn, Caotun Township 54243, Nantou County, Taiwan
关键词
Cubic residue; Discrete logarithm problem with a composite modulus; Provable security; Random oracle model; IDENTIFICATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since a single computationally hard problem today may possibly be solved efficiently in the future, many researchers endeavored in recent years to base their cryptosystern security on solving two or more hard problems simultaneously to enhance the system security. However, it is found that many previously suggested signature schemes with their (1) security based on integer factorization and discrete logarithm problems and with (2) verification equation using exponential quadratic forms were not as secure as claimed and gave no provable security under the random oracle model. We, therefore, use the theory of cubic residues to present a new signature scheme with an exponential cubic verification equation to prevent the attack from Pollard-Schnorr's congruence solutions and give a formal proof of the scheme security by random oracle modeling. We formally prove that, based on solving the discrete logarithm problem with a composite modulus (which has been shown by Bach in 1984 to be exactly as hard as simultaneously solving the integer factorization and the discrete logarithm with a prime modulus), the proposed scheme is resistant against both no-message and adaptively chosen-message attacks.
引用
收藏
页码:1645 / 1663
页数:19
相关论文
共 50 条
  • [21] Security of digital signature scheme based on factoring and discrete logarithms
    Chang, CC
    Chang, YF
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 331 - 332
  • [22] Post -quantum digital signature scheme based on multivariate cubic problem
    Kundu, Nibedita
    Debnath, Sumit Kumar
    Mishra, Dheerendra
    Choudhury, Tanmay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [23] A provable secure fuzzy identity based signature scheme
    WANG ChangJi 1
    2 Guangdong Province Information Security Key Laboratory
    ScienceChina(InformationSciences), 2012, 55 (09) : 2139 - 2148
  • [24] A provable secure fuzzy identity based signature scheme
    ChangJi Wang
    Science China Information Sciences, 2012, 55 : 2139 - 2148
  • [25] A pairing-free key-insulated certificate-based signature scheme with provable security
    Xiong, Hu
    Wu, Shikun
    Geng, Ji
    Ahene, Emmanuel
    Wu, Songyang
    Qin, Zhiguang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (03): : 1246 - 1259
  • [26] Provable security of proxy signature schemes
    Gu, CX
    Zhu, YF
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063
  • [27] Quantum proxy signature with provable security
    Xin, Xiangjun
    Yang, Qinglan
    Li, Fagen
    MODERN PHYSICS LETTERS A, 2020, 35 (24)
  • [28] Provable security of ID-based proxy signature schemes
    Gu, CX
    Zhu, YF
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
  • [29] Security of a new digital signature scheme based on factoring and discrete logarithms
    Shao, Z
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2005, 82 (10) : 1215 - 1219
  • [30] An improved and provable self-certified digital signature scheme with message recovery
    Wu, Fan
    Xu, Lili
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) : 344 - 357