Digital signature scheme based on the conjugate twisted root extraction problem

被引:6
作者
Valluri, Maheswara Rao [1 ]
机构
[1] Fiji Natl Univ, Sch Math & Comp Sci, Coll Engn Sci & Technol, POB 7222,Derrick Campus, Suva, Fiji
来源
2015 Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI) | 2015年
关键词
Conjugate twisted root extraction problem; digital signature; endomorphism; group; root extraction problem; BRAID-GROUPS; CRYPTOGRAPHY; CRYPTOSYSTEMS; CRYPTANALYSIS;
D O I
10.1109/MCSI.2015.28
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Digital signatures are important primitives for building secure systems and are widely used in internet and electronic commerce for authentication. The most famous digital signature schemes are based on either the intractability of the integer factorization problem or the discrete logarithmic problem over finite fields. With Shor's algorithm on a quantum computer, these problems become tractable. Hence developments of signature schemes which are not based on these problems are crucial for maintaining information security. This paper introduces the conjugate twisted root extraction problem, and proposes a digital signature scheme based on a group of 2 x 2 matrices over N-truncated one variable polynomials. Its security relies on the conjugate twisted e-th root extraction problem. We prove that an adversary cannot forge a signature on a document unless the adversary extracts the e-th root in this group. The performance and other security issues are also discussed.
引用
收藏
页码:76 / 79
页数:4
相关论文
共 20 条
  • [1] IMPROVED DIGITAL SIGNATURE SCHEME BASED ON DISCRETE EXPONENTIATION
    AGNEW, GB
    MULLIN, RC
    VANSTONE, SA
    [J]. ELECTRONICS LETTERS, 1990, 26 (14) : 1024 - 1025
  • [2] [Anonymous], 2002, 2002168 CRYPT EPRINT
  • [3] [Anonymous], IEEE T INFORM THEORY
  • [4] Anshel I, 1999, MATH RES LETT, V6, P287
  • [5] Anshel I, 2002, United States patent, Patent No. [US6493449B2, 6493449]
  • [6] B├a┬╝rgisser P., 1997, ALGEBRAIC COMPLEXITY
  • [7] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [8] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
  • [9] Lee E, 2003, LECT NOTES COMPUT SC, V2656, P477
  • [10] Lee EK, 2004, IEICE T FUND ELECTR, VE87A, P986