Game Optimization for RSA Signature Scheme

被引:0
|
作者
Wang Yi-chuan [1 ]
Ma Jian-feng [1 ]
Lu Di [1 ]
Zhang Liu-mei [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
关键词
Game Theory; RSA; Signature; Re-keying;
D O I
10.4028/www.scientific.net/AMM.513-517.969
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Security and efficiency for using RSA signature scheme are critical requirements for many network applications. In this paper, we present a Game Model for RSA Signature Scheme (GMRS). By analyzing our model with information and game theory, we prove that the Nash-equilibrium is existent in GMRS. Accordingly, we propose an optimization scheme for updating the private key. The experiment result shows that, our scheme can significant promote the efficiency and ensure the security, even in the lowest risk-level case and for an adversary with unlimited computing power.
引用
收藏
页码:969 / 972
页数:4
相关论文
共 50 条
  • [11] On the security of some variants of the RSA signature scheme
    Michels, M
    Stadler, M
    Sun, HM
    COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 85 - 96
  • [12] A threshold RSA signature scheme with traceable signers
    Shi, Runhua
    Zhong, Hong
    Huang, Liusheng
    Journal of Computational Information Systems, 2009, 5 (04): : 1143 - 1146
  • [13] A New RSA-Based Signature Scheme
    Schaege, Sven
    Schwenk, Joerg
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 1 - 15
  • [14] Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme
    Li Wei
    Li Gang
    Xin Xiangjun
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 903 - +
  • [15] On the security of a RSA-based certificateless signature scheme
    He, Debiao
    Khan, Muhammad Khurram
    Wu, Shuhua
    International Journal of Network Security, 2014, 16 (01) : 78 - 80
  • [16] An Improved Threshold Proxy Signature Scheme Based on RSA
    Dong, Xuedong
    Gao, Yuan
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 629 - 632
  • [17] Efficient Group Signature Scheme Based on RSA Cryptosystem
    Chen Yan-Hua
    Ye Cheng-Qing
    Zhang Peng
    2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 356 - +
  • [18] Comparison of ECDSA and RSA Signature Scheme on NLSR Performance
    Afryansyah, Deden Irfan
    Perbawa, Muhammad Raka
    Sari, Riri Fitri
    2017 IEEE ASIA PACIFIC CONFERENCE ON WIRELESS AND MOBILE (APWIMOB), 2017, : 7 - 11
  • [19] A modification of Jarecki and Saxena proactive RSA signature scheme
    Nikov, Ventzislav
    Nikova, Svetla
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 1026 - +
  • [20] Improvement of Shoup's threshold RSA signature scheme
    Wang, Gui-Lin
    Qing, Si-Han
    Wang, Ming-Sheng
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (09): : 1046 - 1050