Digital Signature Scheme Based on a New Hard Problem

Factorizing composite number n = qr, where q and r are two large primes, and finding discrete logarithm modulo large prime number p are two dicult computational problems which are usually put into the base of dierent digital signature schemes (DSSes). This paper introduces a new hard computational problem that consists in finding the kth roots modulo large prime p = Nk 2 + 1, where N is an even number and k is a prime with the length jkj ‚ 160. Diculty of the last problem is estimated as O( p k). It is proposed a new DSS with the public key y = x k mod p, where x is the private key. The signature corresponding to some message M represents a pair of the jpjbit numbers S and R calculated as follows: R = t k mod p and S = tx f(R;M) mod p, where f(R;M) is a compression function. The verification equation is S k mod p = y f(R;M) R mod p. The

[1]  A. A. Moldovyan,et al.  Class of Provably Secure Information Authentication Systems , 2007 .

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  Jennifer Seberry,et al.  Fundamentals of Computer Security , 2003, Springer Berlin Heidelberg.

[4]  Nigel P. Smart,et al.  Cryptography: An Introduction , 2004 .

[5]  Nikolay A. Moldovyan New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems , 2007, IF&GIS.

[6]  A. Meyer,et al.  Introduction to Number Theory , 2005 .

[7]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[8]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[9]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[10]  He Rose A course in number theory (2nd Edn) , 1994 .

[11]  Alexandra Boldyreva,et al.  Efficient threshold signature , multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme , 2002 .

[12]  Neal Koblitz,et al.  a course in number theory , 1987 .

[13]  Dmitriy N. Moldovyan,et al.  Cryptoschemes Based on New Signature Formation Mechanism , 2006, Comput. Sci. J. Moldova.

[14]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.