Meta-elgamal Signature Schemes Using a Composite Module Meta-elgamal Signature Schemes Using a Composite Modul

نویسندگان

  • Patrick Horster
  • Markus Michels
  • Holger Petersen
چکیده

Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by reprints or legally obtained copies of the article. Abstract In 1984 ElGamal published the rst signature scheme based on the discrete logarithm problem. Since then a lot of work was done to modify and generalize this signature scheme. Very important steps of recent research were the discovery of eecient signature schemes with appendix , e.g. by Schnorr, Nyberg/Rueppel or Harn. All these variants can be embedded into a Meta-ElGamal signature scheme. Until now all schemes except one have in common that the veriication is done over a nite eld. In this paper we focus on those schemes where a composite modul n = pq instead of a prime-modul p is used in the Meta-ElGamal signature scheme. An unmodiied scheme is cryptoanalysed in this composite mode, further we introduce some new reened modes and give a security and performance analysis of the various schemes. As a result, some schemes can be used in these modes with slight modiications. Although the security of these schemes can't be proven, the advantages are that even existential forging-easy in prime-based modes without hashing or using a redundancy scheme-seems to be hard in the Meta-ElGamal signature schemes the parameters can be chosen such that the security relays on both the discrete logarithm and the factorization problem.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications

There have been several approaches in the past to obtain signature schemes with appendix and signature schemes giving message recovery based on the discrete logarithm problem. Most of them can be embedded into a Meta-ElGamal and Meta-Message recovery scheme. In this paper we present the Meta-blind signature schemes which have been developed from the ElGamal based blind signature scheme and the ...

متن کامل

Improvements and generalisations of signcryption schemes

In this work, we study the cryptographic primitive: signcryption, which combines the functionalities of digital signatures and public-key encryption. We first propose two generic transforms from meta-ElGamal signature schemes to signcryption schemes. These constructions can be thought of as generalisations of the signcryption schemes by Zheng and Gamage et al. Our results show that a large clas...

متن کامل

Novel Digital Signature Schemes based on Factoring and Discrete Logarithms

In the paper, we propose a new digital signature scheme based on factoring and discrete logarithms. Specially, we prove that the security of the proposed signature scheme is based on both the security of the ElGamal signature scheme and the security of the modified OSS signature scheme. This is the first scheme which can be proved that its security is based on two hard problems. Like Meta-ElGam...

متن کامل

Digital Signature Schemes Based on Lucas Functions Digital Signature Schemes Based on Lucas Functions

Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by rep...

متن کامل

Subliminal Channels in Discrete Logarithm Based Signature Schemes and How to Avoid Them Subliminal Channels in Discrete Logarithm Based Signature Schemes and How to Avoid Them

Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by rep...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994