Skip to main content

Digital Signature Schemes from Two Hard Problems

  • Conference paper
  • First Online:
Multimedia and Ubiquitous Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 240))

  • 1245 Accesses

Abstract

In this paper, we propose two new signature schemes and a novel short signature scheme from two hard problems. The proposed schemes have two prominent advantages. Firstly, they are developed from some signature schemes where the security and efficiency have been proven. Therefore, they inherit these properties from the previous schemes. Secondly, the security of the proposed schemes is based on two hard problems. Therefore, they are still safe even when cryptanalysis has an effective algorithm to solve one of these problems, but not both. Moreover, we also propose a method for reducing signatures and this is the first attempt to reduce signatures based on two hard problems. Therefore, our proposed schemes are suitable for the applications requiring long-term security in resource limited systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton

    Book  Google Scholar 

  2. Pieprzyk J, Hardjono T, Seberry J (2003) Fundamentals of computer security. Springer, New York

    Book  MATH  Google Scholar 

  3. Harn L (1994) Public-key cryptosystem design based on factoring and discrete logarithms. IEEE Proc Comput Digit Tech 141(3):193–195

    Article  MATH  Google Scholar 

  4. Tzeng SF, Yang CY, Hwang MS (2004) A new digital signature scheme based on factoring and discrete logarithms. Int J Comput Math 81(1):9–14

    Article  MATH  MathSciNet  Google Scholar 

  5. Ismail ES, Tahat NMF (2011) A new signature scheme based on multiple hard number theoretic problems. ISRN Commun Netw

    Google Scholar 

  6. Li J, Xiao G (1998) Remarks on new signature scheme based on two hard problems. Electron Lett 34(25):2401–2402

    Article  Google Scholar 

  7. Chen T-H, Lee W-B, Horng G (2005) Remarks on some signature schemes based on factoring and discrete logarithms. Appl Math Comput 169:1070–1075

    Article  MATH  MathSciNet  Google Scholar 

  8. Buchmann J, May A, Vollmer U (2006) Perspectives for cryptographic long term security. Commun ACM 49(9):50–55

    Article  Google Scholar 

  9. Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: ASIACRYPT ‘01, vol 2248. LNCS, pp 514–532

    Google Scholar 

  10. Moldovyan NA (2009) Short signatures from difficulty of factorization problem. Int J Netw Secur 8(1):90–95

    Google Scholar 

  11. Dernova ES (2009) Information authentication protocols based on two hard problems. PhD Dissertation, St.Petersburg State Electrotechnical University. St. Petersburg, Russia

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Binh V. Do .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht(Outside the USA)

About this paper

Cite this paper

Do, B.V., Nguyen, M.H., Moldovyan, N.A. (2013). Digital Signature Schemes from Two Hard Problems. In: Park, J., Ng, JY., Jeong, HY., Waluyo, B. (eds) Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 240. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6738-6_100

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6738-6_100

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6737-9

  • Online ISBN: 978-94-007-6738-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics