A NOVEL DIGITAL SIGNATURE SCHEME BASED ON CUBIC RESIDUE WITH PROVABLE SECURITY

被引:0
作者
Lin, Hsiu-Feng [1 ]
Gun, Chiou-Yueh [2 ,3 ]
Chen, Chih-Ying [2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Feng Chia Univ, Dept Commun Engn, Taichung 40724, Taiwan
[3] Nan Kai Univ Technol, Dept Mech Engn, Caotun Township 54243, Nantou County, Taiwan
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2012年 / 8卷 / 3A期
关键词
Cubic residue; Discrete logarithm problem with a composite modulus; Provable security; Random oracle model; IDENTIFICATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since a single computationally hard problem today may possibly be solved efficiently in the future, many researchers endeavored in recent years to base their cryptosystern security on solving two or more hard problems simultaneously to enhance the system security. However, it is found that many previously suggested signature schemes with their (1) security based on integer factorization and discrete logarithm problems and with (2) verification equation using exponential quadratic forms were not as secure as claimed and gave no provable security under the random oracle model. We, therefore, use the theory of cubic residues to present a new signature scheme with an exponential cubic verification equation to prevent the attack from Pollard-Schnorr's congruence solutions and give a formal proof of the scheme security by random oracle modeling. We formally prove that, based on solving the discrete logarithm problem with a composite modulus (which has been shown by Bach in 1984 to be exactly as hard as simultaneously solving the integer factorization and the discrete logarithm with a prime modulus), the proposed scheme is resistant against both no-message and adaptively chosen-message attacks.
引用
收藏
页码:1645 / 1663
页数:19
相关论文
共 46 条
  • [1] [Anonymous], 1993, CCS
  • [2] [Anonymous], ELEMENTARY NUMBER TH
  • [3] [Anonymous], 2002, J DISCRET MATH SCI C, DOI DOI 10.1080/09720529.2002.10697946
  • [4] Bach E., 1984, 84186 UCBCSD
  • [5] Blum M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P103, DOI 10.1145/62212.62222
  • [6] Brickell E., 1992, Journal of Cryptology, V5, P29, DOI 10.1007/BF00191319
  • [7] Brickell E, 2000, LECT NOTES COMPUT SC, V1751, P276
  • [8] The random oracle methodology, revisited
    Canetti, R
    Goldreich, O
    Halevi, S
    [J]. JOURNAL OF THE ACM, 2004, 51 (04) : 557 - 594
  • [9] Chang C. C., 2005, P INT C CYB CW 05
  • [10] Chang CC, 2009, INT J INNOV COMPUT I, V5, P3059