Space Efficient Signature Schemes from the RSA Assumption

被引:0
|
作者
Yamada, Shota [1 ]
Hanaoka, Goichiro [2 ]
Kunihiro, Noboru [1 ]
机构
[1] Univ Tokyo, Tokyo, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
来源
关键词
Short signature; m-time signature; RSA assumption; SIGN SIGNATURES; RANDOM ORACLES; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signature schemes from the RSA assumption are very important because of their highly reliable security. Despite their importance, only a few digital signature schemes from the RSA assumption are currently known. Thus, improvement of efficiency in this area seems to be very important. In this paper, we propose various signature schemes from the RSA assumption. First, we propose a scheme that simultaneously provides the shortest signatures and public key length among the known schemes. Compared with the known best schemes, the signature size is the same as that of the scheme proposed recently by Hofheinz, Jager, and Kiltz, whereas the public key size is about the half that of the Hohenberger-Waters scheme. The drawback of the scheme is its heavy signing and verification algorithms. Second, we also propose a scheme whose public key is longer than our first scheme, but the signing and verification cost is more efficient. The scheme can be seen as a generalization of our first scheme and the Hofheinz-Jager-Kiltz scheme. Finally, we propose a scheme whose signing and verification algorithms are more efficient than our first and second schemes, whereas the signature size is longer. All these schemes are constructed based on a new observation about the relation between m-time signature schemes and short signature schemes.
引用
下载
收藏
页码:102 / 119
页数:18
相关论文
共 50 条
  • [1] Signature schemes based on the strong RSA assumption
    Cramer, R
    Shoup, V
    6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 1999, : 46 - 51
  • [2] An Efficient Synchronized Aggregate Signature Scheme From Standard RSA Assumption
    Quo, Xinshun
    Wang, Zhiwei
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2014, 7 (03): : 229 - 240
  • [3] From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption
    Chatterjee, Sanjit
    Kabaleeshwaran, R.
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 183 - 203
  • [4] Signature scheme based on the strong RSA assumption
    Wang, Bao-You
    Hu, Yun-Fa
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (08): : 1729 - 1734
  • [5] New signature scheme based on the strong RSA assumption
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2007, 4 (634-637):
  • [6] A New Group Signature Scheme Based on RSA Assumption
    Yang, Chou-Chen
    Chan, Ting-Yi
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (01): : 61 - 66
  • [7] An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption
    Naji, Akram A. M.
    Abu Hasan, Yahya
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 259 - 264
  • [8] Distributed RSA signature schemes for general access structures
    Herranz, J
    Padró, C
    Sáez, G
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 122 - 136
  • [9] Randomization enhanced blind signature schemes based on RSA
    Kwon, M
    Cho, Y
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (03): : 730 - 733
  • [10] A new approach to robust threshold RSA signature schemes
    Safavi-Naini, R
    Wang, HX
    Lam, KY
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 184 - 196