A new conic curve digital signature scheme with message recovery and without one-way hash functions

被引:0
|
作者
Tahat, Nedal [1 ]
机构
[1] Hashemite Univ, Dept Math, Zarqa 13115, Jordan
来源
ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES | 2013年 / 40卷 / 02期
关键词
conic curve; finite field; message recovery; One-way hash function; simulated attacks;
D O I
暂无
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In this paper, we present an efficient digital signature scheme with message recovery and without using any one-way hash function and message redundancy. The new scheme is based on conic curve cryptography (CCC) that offers a very high level of security with a small key size. Obviously, the result is a low computational cost and a clear saving in memory and bandwidth. The security of the new scheme is based on two hard problems, the discrete logarithm on conic curve and factorization problem. It provides higher level security than schemes based on a single hard problem. We show in details that the proposed scheme does not involve any modular exponentiation operation in all algorithms.
引用
收藏
页码:148 / 153
页数:6
相关论文
共 50 条
  • [21] Non-adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions
    Mao, Xinyu
    Mazor, Noam
    Zhang, Jiapeng
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 502 - 531
  • [22] Higher order Universal One-Way Hash Functions
    Hong, DJ
    Preneel, B
    Lee, S
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 201 - 213
  • [23] A composition theorem for universal one-way hash functions
    Shoup, V
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 445 - 452
  • [24] A publicly verifiable authenticated encryption scheme without using one-way hash function
    Xie, Shi-Y
    Xu, Bing
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2511 - 2514
  • [25] STRUCTURAL-PROPERTIES OF ONE-WAY HASH FUNCTIONS
    ZHENG, YL
    MATSUMOTO, T
    IMAI, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 285 - 302
  • [26] A watermarking technique based on one-way hash functions
    Hwang, MS
    Chang, CC
    Hwang, KF
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1999, 45 (02) : 286 - 294
  • [27] Secrecy without one-way functions
    Grigoriev, Dima
    Shpilrain, Vladimir
    GROUPS COMPLEXITY CRYPTOLOGY, 2013, 5 (01) : 31 - 52
  • [28] NEW SIGNATURE SCHEME WITH MESSAGE RECOVERY
    PIVETEAU, JM
    ELECTRONICS LETTERS, 1993, 29 (25) : 2185 - 2185
  • [29] A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (02): : 197 - 201
  • [30] One-way Hash function construction based on chaotic message expansion
    Guo W.
    Wang X.
    Liu J.
    He D.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2010, 45 (05): : 751 - 757