Abstract
In this paper, we propose three digital signature schemes based on the algebraic structure of group ring. The first scheme is a deterministic signature scheme, the second scheme is a probabilistic signature scheme whereas the third scheme is an uplifting of the NTRU signature scheme in group ring. We carefully discuss the security of these schemes by studying the hardness of the associated hard problems. We show that our schemes, with parameters of small size, provide the security equivalent to the security provided by the current secure implementations of discrete logarithm problem (e.g. 128 bits). We also discuss some examples to see the practicality of our schemes. This paper is the first advancement in the field of group ring based digital signatures.
Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Bernstein DJ, Buchmann J, Dahmen E. Post Quantum Cryptography. Springer; 2009.
Bleumer G. Selective Forgery. In: van Tilborg HCA, Jajodia S, editors. Encyclopedia of Cryptography and Security. Boston: Springer; 2011. p. 1174–5.
Cui H, Deng RH, Liu JK, Yi X, Li Y. Server-Aided attribute based signature with revocation for resource-constrained Industrial-Internet-of-Things devices. IEEE Trans Ind Informat. 2018;14(8):3724–32.
Dietzel C, Mittal G. Summands of finite group algebras. Czech Math J. 2021;71:1011–4.
Esposito C, Castiglione A, Palmieri F, Santis AD. Integrity for an event notification within the industrial Internet of Things by using group signatures. IEEE Trans Ind Informat. 2018;14(8):3669–78.
Goel N, Gupta I, Dubey M, Dass BK. Undeniable signature scheme based over group ring. AAECC. 2016;27:523–35.
Goel N, Gupta I, Dass BK. Zero knowledge undeniable signature scheme over semigroup action problem. Italian J Pure Appl Math. 2017;38:45–53.
Gupta I, Pandey A, Dubey M. A key exchange protocol using matrices over group ring. Asian Eur J Math. 2019;12(5):1950075.
Hoffstein J, Pipher J, Silverman J. An Introduction of Mathematical Cryptography. Springer; 2008.
Hurley B, Hurley T. Group ring cryptography. Int J Pure Appl Math. 2011;69(1):67–86.
Inam S, Ali R. A new ElGamal-like cryptosystem based on matrices over groupring. Neural Comput Appl. 2018;29(11):1279–83.
Meshram C, Obaidat MS, Tembhurne JV, Shende SW, Kalare KW, Meshram SG. A lightweight provably secure digital short-signature technique using extended chaotic maps for human-centered IoT systems. IEEE Syst J. 2021;15(4):5507–15.
Meshram C, Meshram SG, Ibrahim RW, Jalab HA, Jamal SS, Barve SK. Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card. Comput Intell Syst. 2022;8:973–87.
Menzes A, Oorschot P, Vanstone S. Handbook of Applied Cryptography. Boca Raton: CRC Press; 2001.
Milies CP, Sehgal SK. An Introduction to group rings, Kluwer, \(2002\).
Mughal MA, Luo X, Ullah A, Ullah S, Mahmood Z. A lightweight digital signature based security scheme for human centered Internet of Things. IEEE Access. 2018;6:31630–43.
Mittal G, Kumar S, Narain S, Kumar S, Group rings based public key cryptosystems. J Discret Math Sci Cryptogr. 2021. https://doi.org/10.1080/09720529.2020.1796868
Mittal G, Kumar S, Kumar S. Novel public-key cryptosystems based on NTRU and algebraic structure of group rings. J Info Opt Sci. 2021;42(7):1507–21.
Mittal G, Kumar S, Kumar S. A quantum secure ID-based cryptographic encryption based on group rings. Sadhana. 2022;47:0035.
Nguyen P. A note on the security of NTRUSign, Cryptology ePrint Archive, Report 2006/387. 2006.
Nguyen P, Regev O. Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures. In: Advances in Cryptology-EUROCRYPT’06, Vol. 4004, Lecture Notes in Comput. Sci., Springer. 2006.
Pan H-T, Yang H-W, Wang M-S. An enhanced secure smart card-based password authentication scheme. Int J Netw Secur. 2020;22(2):358–63.
Rososhek SK. Cryptosystems in automorphism groups of group rings of abelian groups. J Math Sci (NY). 2008;154(3):386–91.
Seo JH. Efficient digital signatures from RSA without random oracles. Inf Sci. 2020;512:472–80.
Shen L, Ma J, Liu X, Wei F, Miao M. A secure and efficient ID-Based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J. 2017;4(2):546–54.
Singh S, Padhye S. Identity based blind signature scheme over NTRU lattices. Inf Process Lett. 2020;155:105898.
Verma GK, Singh BB, Kumar N, Obaidat MS, He D, Singh H. An efficient and provable certificate-based proxy signature scheme for IIoT environment. Inf Sci. 2020;518:142–56.
Xie J, Hu Y-P, Gao J-T, Gao W. Efficient identity-based signature over ntru lattice. Front Info Tech Elect Eng. 2016;17(2):135–42.
Zhu H, Tan Y-A, Zhu L, Wang X, Zhang Q, Li Y. An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors. 2018;18(5)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kumar, S., Mittal, G. & Kumar, S. Digital Signature Schemes Based on Group Ring. SN COMPUT. SCI. 3, 398 (2022). https://doi.org/10.1007/s42979-022-01286-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-022-01286-8