Matrix Modification of RSA Digital Signature Scheme

被引:1
|
作者
Gupta, S. C. [1 ]
Sanghi, Manju [2 ]
机构
[1] Cent Inst Plast Engn & Technol, Dept Math, Raipur, Madhya Pradesh, India
[2] Rungta Coll Engn & Technol, Dept Math, Khoka Kurud Rd, Bhilai 490024, India
关键词
Digital signature scheme; RSA; general linear group;
D O I
10.1080/19361610.2019.1690350
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Representation of message in the form of a matrix in place of integers can reduce the key sizes along with the storage space without compromising the security. In this paper we propose modification of RSA digital signature scheme using square matrices of order h x h. Instead of relying on the Euler's totient function it relies on the exponentiation modulus, which is obtained by the concept of the general linear group of order h.
引用
收藏
页码:63 / 70
页数:8
相关论文
共 50 条
  • [11] CRYPTANALYSIS OF THE HARN AND WANG MODIFICATION OF THE XINMEI DIGITAL SIGNATURE SCHEME
    ALABADDI, M
    WICKER, SB
    ELECTRONICS LETTERS, 1992, 28 (18) : 1756 - 1758
  • [12] Distributed Signature Scheme (DSS) based on RSA
    Pazynyuk, T.
    Oreku, G.S.
    Li, J.
    Information Technology Journal, 2008, 7 (05) : 802 - 807
  • [13] Signature scheme based on the strong RSA assumption
    Wang, Bao-You
    Hu, Yun-Fa
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (08): : 1729 - 1734
  • [14] A Short Signature Scheme from the RSA Family
    Yu, Ping
    Xue, Rui
    INFORMATION SECURITY, 2011, 6531 : 307 - 318
  • [15] A Threshold RSA Signature Scheme with Traceable Signers
    Shi, Runhua
    Zhong, Hong
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 647 - 649
  • [16] A strong RSA signature scheme and its application
    Cao, Zhengjun
    Liu, Lihua
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 111 - +
  • [17] An efficient implementation of a threshold RSA signature scheme
    King, B
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 382 - 393
  • [18] On the security of some variants of the RSA signature scheme
    Michels, M
    Stadler, M
    Sun, HM
    COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 85 - 96
  • [19] A threshold RSA signature scheme with traceable signers
    Shi, Runhua
    Zhong, Hong
    Huang, Liusheng
    Journal of Computational Information Systems, 2009, 5 (04): : 1143 - 1146
  • [20] A New RSA-Based Signature Scheme
    Schaege, Sven
    Schwenk, Joerg
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 1 - 15