Batch Private Keys Generation for RSA in Security Communication Systems

被引:1
|
作者
陈运
陈新
机构
[1] School of Information Technology & Computer Science, University of Wollongong NSW 2522 Australia ,College of Information and Electrical Engineering, Zhengzhou University of Light Industry Zhengzhou 450002 China
[2] School of Communications & Information Engineering, UESTC Chengdu 610054 China
关键词
information security system; public key cryptosystem; RSA; key generation;
D O I
暂无
中图分类号
TN918.6 [保密通信:按结构原理分];
学科分类号
0839 ; 1402 ;
摘要
RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.
引用
收藏
页码:22 / 26
页数:5
相关论文
共 50 条
  • [21] CHILDRENS UNDERSTANDING OF PRIVATE KEYS IN REFERENTIAL COMMUNICATION
    ACKERMAN, BP
    SILVER, D
    [J]. JOURNAL OF EXPERIMENTAL CHILD PSYCHOLOGY, 1990, 50 (02) : 217 - 242
  • [22] Partial Key Attack Given MSBs of CRT-RSA Private Keys
    Abd Ghafar, Amir Hamzah
    Ariffin, Muhammad Rezal Kamel
    Yasin, Sharifah Md
    Sapar, Siti Hasana
    [J]. MATHEMATICS, 2020, 8 (12) : 1 - 20
  • [23] Distributed generation of shared RSA keys in mobile ad hoc networks
    Liu, YL
    Huang, Q
    Shen, Y
    [J]. ICMIT 2005: INFORMATION SYSTEMS AND SIGNAL PROCESSING, 2005, 6041
  • [24] The keys to holographic data security - Encrypted optical memory systems based on multidimensional keys for secure data storage and communication
    Matoba, O
    Javidi, B
    [J]. IEEE CIRCUITS & DEVICES, 2000, 16 (05): : 8 - 15
  • [25] Behavioral Keys in Cryptography and Security Systems
    Ogiela, Marek R.
    Ogiela, Lidia
    [J]. ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, INCOS-2017, 2018, 8 : 296 - 300
  • [26] Revocation Systems with Very Small Private Keys
    Lewko, Allison
    Sahai, Amit
    Waters, Brent
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 273 - 285
  • [27] The Method of Generation Security Profile for Communication Networks and Switching Systems
    Dudykevych, V. B.
    Garasym, Y. R.
    [J]. EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS: PROCEEDINGS OF THE XTH INTERNATIONAL CONFERENCE CADSM 2009, 2009, : 82 - 84
  • [28] Security of practical private randomness generation
    Pironio, Stefano
    Massar, Serge
    [J]. PHYSICAL REVIEW A, 2013, 87 (01):
  • [29] Pell's RSA key generation and its security analysis
    Segar, Chandra T.
    Vijayaragavan, R.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [30] Substation Communication security Research Based on Hybrid Encryption of DES and RSA
    Wang Fangfang
    Wang Huazhong
    Chen Dongqing
    Peng Yong
    [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 437 - 441