A digital signature scheme based on general Chebyshev polynomialA digital signature scheme based on general Chebyshev polynomialS. Li et al.

被引:0
|
作者
Shouliang Li [1 ]
Rudong Min [1 ]
Jilong Zhang [1 ]
Jiale Han [1 ]
Yulin Shen [2 ]
Zhen Yang [1 ]
Yi Yang [1 ]
机构
[1] Lanzhou University,School of Information Science and Engineering
[2] Gansu Computing Center,undefined
关键词
Chaotic system; General Chebyshev polynomial; Semigroup property; Digital signature;
D O I
10.1007/s11227-025-07074-4
中图分类号
学科分类号
摘要
Despite the operational efficiency and lower computational costs of public key cryptography based on the Chebyshev polynomial compared to elliptic curve cryptography (ECC), the digital signature schemes based on the Chebyshev polynomial have not been widely applied. The primary obstacle includes its short period characteristic and coefficient fixation issue, which makes cryptosystems vulnerable to exhaustive attacks. To enhance the resistance of cryptosystems to the exhaustive attack, the general Chebyshev polynomial (GCP) is developed in this paper. It still possesses the semigroup property that public key cryptosystems rely on and provides an optional parameter that improves its complexity and pluralism. A novel digital signature scheme with reduced design complexity and enhanced security based on GCP is proposed. Theoretical analyses and experimental results show that this digital signature scheme offers more advantages in terms of both security and efficiency than existing schemes.
引用
下载
收藏
相关论文
共 50 条
  • [21] Digital Signature Scheme Based on a New Hard Problem
    Moldovyan, Nikolay A.
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2008, 16 (02) : 163 - 182
  • [22] Digital Signature Scheme Based on Two Hard Problems
    Wei, Shimin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (12): : 207 - 209
  • [23] General transitive signature scheme based on homomorphic encryption
    Peng, Chang-Gen
    Tian, You-Liang
    Zhang, Bao
    Xu, Zhi-Pin
    Tongxin Xuebao/Journal on Communications, 2013, 34 (11): : 18 - 25
  • [24] New image authentication scheme based on digital signature
    Liu, BF
    Zhang, WJ
    Yu, SY
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, : 302 - 307
  • [25] A new key exchange scheme based on Chebyshev polynomials
    Wang Dahu
    Yang Haizhu
    Yu Fashan
    Wang Xudong
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 124 - 127
  • [26] A digital secure image communication scheme based on the chaotic Chebyshev map
    Liao, XF
    Li, XM
    Pen, J
    Chen, GR
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2004, 17 (05) : 437 - 445
  • [27] Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm
    Peng C.
    Luo M.
    He D.
    Huang X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2278 - 2286
  • [28] On the security of Miyaji et al. group signature scheme
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 1373 - 1382
  • [29] An attack on libert et al.'s ID-based undeniable signature scheme
    Li, Zichen
    Chong, C.F.
    Hui, Lucas Chi-Kwong
    Yiu, Siu-Ming
    Chow, K.P.
    Tsang, Wai-Wan
    Chan, H.W.
    Pun, Kelvin K. H
    International Journal of Network Security, 2007, 5 (02) : 220 - 223
  • [30] Attack on libert et al.'s ID-based undeniable signature scheme
    Department of Information Security, Beijing Eelctronic Science and Technology Institute, Beijing 100070, China
    不详
    不详
    Chin J Electron, 2008, 4 (748-750):