An Efficient Elliptic Curve Discrete Logarithm based Trapdoor Hash Scheme without Key Exposure

被引:2
|
作者
Sun, Yi [1 ,2 ]
Chen, Xingyuan [3 ]
Du, Xuehui [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
[2] Zhengzhou Informat Sci & Technol Insitute, State Key Lab Math Engn & Adv Comp, Zhengzhou, Henan, Peoples R China
[3] Zhengzhou Informat Sci & Technol Insitute, Zhengzhou, Henan, Peoples R China
关键词
Trapdoor hash function; Key-exposure; Elliptic curve discrete logarithm;
D O I
10.4304/jcp.8.11.2851-2856
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The trapdoor hash function plays essential role in constructing certain secure digital signature, and signature scheme that composed by trapdoor hash function is widely applied in different fields. However, the key exposure problem of trapdoor hash scheme has brought great distress. In this paper, an efficient trapdoor hash scheme without key exposure based on elliptic curve discrete logarithm is put forward and its security is analyzed, the scheme satisfies the five properties of trapdoor hash functions: effective calculation, trapdoor collision, collision resistance, key exposure resistance and semantic security. Through comparing and analyzing with the existing schemes, it shows that the proposed scheme, which has only multiplicative complexity and removes the operations of computing finite field element inverse, is more advantage in terms of safety and efficiency. Moreover, the scheme supports batch computation that it can greatly improve the efficiency of verification.
引用
收藏
页码:2851 / 2856
页数:6
相关论文
共 19 条
  • [1] An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem
    Tahat, Nedal
    Alomari, A. K.
    Al-Hazaimeh, Obaida M.
    Al-Jamal, Mohammad F.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (04) : 935 - 948
  • [2] A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem
    Yang, CC
    Chang, TY
    Hwang, MS
    COMPUTER STANDARDS & INTERFACES, 2003, 25 (02) : 141 - 145
  • [3] Identity-Based Chameleon Hash Scheme without Key Exposure
    Chen, Xiaofeng
    Zhang, Fangguo
    Susilo, Willy
    Tian, Haibo
    Li, Jin
    Kim, Kwangjo
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 200 - +
  • [4] An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things
    Shu, Hong
    Chen, Fulong
    Xie, Dong
    Sun, Liping
    Qi, Ping
    Huang, Yongqing
    SENSORS, 2019, 19 (19)
  • [5] Chameleon hash without key exposure based on Schnorr signature
    Gao, Wei
    Li, Fei
    Wang, Xueli
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 282 - 285
  • [6] Speeding up elliptic curve discrete logarithm computations with point halving
    Fangguo Zhang
    Ping Wang
    Designs, Codes and Cryptography, 2013, 67 : 197 - 208
  • [7] Speeding up elliptic curve discrete logarithm computations with point halving
    Zhang, Fangguo
    Wang, Ping
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 67 (02) : 197 - 208
  • [8] A new E-cash scheme based on a trapdoor hash function
    Yang, Fuw-Yi
    Chiu, Su-Hui
    Chen, Hung-Yumr
    Advances in Information Sciences and Service Sciences, 2012, 4 (09): : 229 - 237
  • [9] Fastest Parallel Molecular Algorithms for the Elliptic Curve Discrete Logarithm Problem over GF(2n)
    Iaccarino, Gennaro
    Mazza, Tommaso
    WORKSHOP ON BIO-INSPIRED ALGORITHMS FOR DISTRIBUTED SYSTEMS - BADS 2009, 2009, : 95 - 104
  • [10] Signature scheme with forward security based on elliptic curve cryptosystem
    Liu, Yali
    Yin, Xinchun
    Zhu, Hong
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1118 - 1123