Game Optimization for RSA Signature Scheme

被引:0
|
作者
Wang Yi-chuan [1 ]
Ma Jian-feng [1 ]
Lu Di [1 ]
Zhang Liu-mei [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
关键词
Game Theory; RSA; Signature; Re-keying;
D O I
10.4028/www.scientific.net/AMM.513-517.969
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Security and efficiency for using RSA signature scheme are critical requirements for many network applications. In this paper, we present a Game Model for RSA Signature Scheme (GMRS). By analyzing our model with information and game theory, we prove that the Nash-equilibrium is existent in GMRS. Accordingly, we propose an optimization scheme for updating the private key. The experiment result shows that, our scheme can significant promote the efficiency and ensure the security, even in the lowest risk-level case and for an adversary with unlimited computing power.
引用
收藏
页码:969 / 972
页数:4
相关论文
共 50 条
  • [41] The Cramer-Shoup strong-RSA signature scheme revisited
    Fischlin, M
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 116 - 129
  • [42] Simple threshold RSA signature scheme based on simple secret sharing
    Tang, SH
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 186 - 191
  • [43] New Digital Signature Scheme Based on RSA Using Circulant Matrix
    Bodasingi U.R.
    Gunupuru S.
    SN Computer Science, 4 (3)
  • [44] Optimization of the MOVA undeniable signature scheme
    Monnerat, J
    Oswald, YA
    Vaudenay, S
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 196 - 209
  • [45] A short identity-based proxy ring signature scheme from RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    COMPUTER STANDARDS & INTERFACES, 2015, 38 : 144 - 151
  • [46] An Efficient and Secure RSA Based Certificateless Signature Scheme for Wireless Sensor Networks
    Singh, Jitendra
    Kumar, Vimal
    Kumar, Rakesh
    ADVANCES IN SIGNAL PROCESSING AND INTELLIGENT RECOGNITION SYSTEMS (SIRS-2015), 2016, 425 : 685 - 697
  • [47] A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Hwang, MS
    Lu, EJL
    Lin, IC
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1552 - 1560
  • [48] A forward-secure blind signature scheme based on the strong RSA assumption
    Duc, DN
    Cheon, JH
    Kim, K
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 11 - 21
  • [49] A randomized RSA-based partially blind signature scheme for electronic cash
    Cao, TJ
    Lin, DD
    Xue, R
    COMPUTERS & SECURITY, 2005, 24 (01) : 44 - 49
  • [50] A NOVEL DISTRIBUTED RSA BLIND AND WEAKLY UNDENIABLE MULTI-SIGNATURE SCHEME
    Chen, Chih-Ying
    Lin, Hsiu-Feng
    Gun, Chiou-Yueh
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (10A): : 6975 - 6998