Game Optimization for RSA Signature Scheme

被引:0
|
作者
Wang Yi-chuan [1 ]
Ma Jian-feng [1 ]
Lu Di [1 ]
Zhang Liu-mei [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
关键词
Game Theory; RSA; Signature; Re-keying;
D O I
10.4028/www.scientific.net/AMM.513-517.969
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Security and efficiency for using RSA signature scheme are critical requirements for many network applications. In this paper, we present a Game Model for RSA Signature Scheme (GMRS). By analyzing our model with information and game theory, we prove that the Nash-equilibrium is existent in GMRS. Accordingly, we propose an optimization scheme for updating the private key. The experiment result shows that, our scheme can significant promote the efficiency and ensure the security, even in the lowest risk-level case and for an adversary with unlimited computing power.
引用
收藏
页码:969 / 972
页数:4
相关论文
共 50 条
  • [1] Batch RSA Signature Scheme
    顾宝军
    周异
    汪为农
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (03) : 290 - 292
  • [2] Batch RSA signature scheme
    Gu B.-J.
    Zhou Y.
    Wang W.-N.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (03) : 290 - 292
  • [3] Distributed Signature Scheme (DSS) based on RSA
    Pazynyuk, T.
    Oreku, G.S.
    Li, J.
    Information Technology Journal, 2008, 7 (05) : 802 - 807
  • [4] Signature scheme based on the strong RSA assumption
    Wang, Bao-You
    Hu, Yun-Fa
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (08): : 1729 - 1734
  • [5] A Short Signature Scheme from the RSA Family
    Yu, Ping
    Xue, Rui
    INFORMATION SECURITY, 2011, 6531 : 307 - 318
  • [6] A Threshold RSA Signature Scheme with Traceable Signers
    Shi, Runhua
    Zhong, Hong
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 647 - 649
  • [7] A strong RSA signature scheme and its application
    Cao, Zhengjun
    Liu, Lihua
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 111 - +
  • [8] An efficient implementation of a threshold RSA signature scheme
    King, B
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 382 - 393
  • [9] Matrix Modification of RSA Digital Signature Scheme
    Gupta, S. C.
    Sanghi, Manju
    JOURNAL OF APPLIED SECURITY RESEARCH, 2021, 16 (01) : 63 - 70
  • [10] An efficient threshold RSA digital signature scheme
    Xu, QL
    Chen, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 25 - 34