Secure and Efficient Signature Scheme Based on NTRU for Mobile Payment

被引:0
作者
Xia, Yunhao [1 ]
You, Lirong [2 ]
Sun, Zhe [2 ]
Sun, Zhixin [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing, Jiangsu, Peoples R China
[2] Zhongtian Technol Corp, Nantong, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017) | 2017年 / 910卷
基金
中国国家自然科学基金;
关键词
D O I
10.1088/1742-6596/910/1/012013
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile payment becomes more and more popular, however the traditional publickey encryption algorithm has higher requirements for hardware which is not suitable for mobile terminals of limited computing resources. In addition, these public-key encryption algorithms do not have the ability of anti-quantum computing. This paper researches publickey encryption algorithm NTRU for quantum computation through analyzing the influence of parameter q and k on the probability of generating reasonable signature value. Two methods are proposed to improve the probability of generating reasonable signature value. Firstly, increase the value of parameter q. Secondly, add the authentication condition that meet the reasonable signature requirements during the signature phase. Experimental results show that the proposed signature scheme can realize the zero leakage of the private key information of the signature value, and increase the probability of generating the reasonable signature value. It also improve rate of the signature, and avoid the invalid signature propagation in the network, but the scheme for parameter selection has certain restrictions.
引用
收藏
页数:9
相关论文
共 22 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]  
Ajtai M., 1997, P 29 ANN ACM S THEOR, P284, DOI DOI 10.1145/258533.258604
[3]  
Ambedkar B R, 2016, INT J ENG SCI COMPUT, V6, P2304, DOI [10.4010/2016.550, DOI 10.4010/2016.550]
[4]  
Elbarkouky Mohamed M. G., 2015, 2015 Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS) held jointly with 2015 5th World Conference on Soft Computing (WConSC), P1, DOI 10.1109/NAFIPS-WConSC.2015.7284152
[5]  
Gertry C, 2002, ADV CRYPTOLOGY EUROC, P299
[6]  
Hoffstein J, 2003, LECT NOTES COMPUT SC, V2612, P122
[7]  
Hoffstein J, 2001, LECT NOTES COMPUT SC, V2045, P211
[8]  
Hoffstein J, ENHANCED ENCODING VE
[9]  
Hoffstein J, 2014, LECT NOTES COMPUT SC, V8772, P142, DOI 10.1007/978-3-319-11659-4_9
[10]  
Hu Yu-Pu, 2008, Chinese Journal of Computers, V31, P1661, DOI 10.3724/SP.J.1016.2008.01661