RSA SIGNATURE SCHEMES WITH SUBLIMINAL-FREE PUBLIC KEY

被引:0
|
作者
Villanyi, Viktoria I. [1 ]
机构
[1] Florida Atlantic Univ, Dept Math Sci, Boca Raton, FL 33431 USA
关键词
subliminal communication; RSA; zero-knowledge proof;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of subliminal channels in the signatures was already studied in the previous literature. In this paper we focus on the problem of subliminal communication through the public verification key. We show a construction which derives a subliminal-free RSA public key. Along the construction we use a computationally binding and unconditionally hiding commitment scheme. To establish a subliminal free RSA modulus n, we have to construct the secret primes p and q. To prove p and q are primes we use Lehmann's primality test on the commitments. We show our "public key subliminal free" signature scheme is indistinguishable from "regular" RSA signature schemes. When we combine our key generation with the existing subliminal free RSA-PSS signature scheme then we get a signature scheme which is subliminal free in the sense of public key and signature.
引用
收藏
页码:19 / 32
页数:14
相关论文
共 50 条
  • [31] Modified RSA Public Key Algorithm
    Aswathy, B. G.
    Resmi, R.
    2014 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL SYSTEMS AND COMMUNICATIONS (ICCSC), 2014, : 252 - 255
  • [32] Public key encryption and signature schemes based on polynomials over Z(n)
    Schwenk, J
    Eisfeld, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 60 - 71
  • [33] Security enhancement for digital signature schemes with fault tolerance in RSA
    Lin, Iuon-Chang
    Chang, Chin-Chen
    INFORMATION SCIENCES, 2007, 177 (19) : 4031 - 4039
  • [34] On the exact security of multi-signature schemes based on RSA
    Kawauchi, K
    Tada, M
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 336 - 349
  • [35] Signature schemes with a fuzzy private key
    Takahashi, Kenta
    Matsuda, Takahiro
    Murakami, Takao
    Hanaoka, Goichiro
    Nishigaki, Masakatsu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 581 - 617
  • [36] Signature schemes with a fuzzy private key
    Kenta Takahashi
    Takahiro Matsuda
    Takao Murakami
    Goichiro Hanaoka
    Masakatsu Nishigaki
    International Journal of Information Security, 2019, 18 : 581 - 617
  • [37] Combined schemes for signature and encryption: The public-key and the identity-based setting
    Gonzalez Vasco, Maria Isabel
    Hess, Florian
    Steinwandt, Rainer
    INFORMATION AND COMPUTATION, 2016, 247 : 1 - 10
  • [38] Public-Key Cryptosystems and Signature Schemes from p-Adic Lattices
    Deng, Yingpu
    Luo, Lixia
    Pan, Yanbin
    Wang, Zhaonan
    Xiao, Guanju
    P-ADIC NUMBERS ULTRAMETRIC ANALYSIS AND APPLICATIONS, 2024, 16 (01) : 23 - 42
  • [39] Digital signature/multisignature schemes giving public key verification and message recovery simultaneously
    Wu, TC
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2001, 16 (06): : 329 - 337
  • [40] MASTER KEY FOR THE RSA PUBLIC-KEY CRYPTOSYSTEM.
    Koyama, Kenji
    Systems, computers, controls, 1982, 13 (01): : 63 - 72