New Digital Signature Scheme Using Multiple Private Keys over Non-Commutative Division Semirings
نویسندگان
چکیده
In this paper, we propose a new signature scheme connecting two private keys and two public keys based on general non-commutative division semiring. The key idea of our technique engrosses three core steps. In the first step, we assemble polynomials on additive structure of non-commutative division semiring and take them as underlying work infrastructure. In the second step, we generate first set of private and public key pair using polynomial symmetrical decomposition problem. In the third step, we generate second set of private and public key pair using discrete logarithm. We use factorization theorem to generate the private key in discrete logarithm problem. By doing so, we can execute a new signature scheme on multiplicative structure of the semiring using multiple private keys. The security of the proposed signature scheme is based on the intractability of the Polynomial Symmetrical Decomposition Problem and discrete logarithm problem over the given noncommutative division semiring. Hence , this signature scheme is so much strong in security point of view.
منابع مشابه
Secured Digital Signature Scheme using Polynomials over Non-Commutative Division Semirings
Digital signatures are probably the most important and widely used cryptographic primitive enabled by public key technology, and they are building blocks of many modern distributed computer applications, like, electronic contract signing, certified email, and secure web browsing etc. But many existing signatures schemes lie in the intractability of problems closely related to the number theory ...
متن کاملA Digital Signature Using Multivariate Functions on Quaternion Ring
We propose the digital signature scheme on non-commutative quaternion ring over finite fields in this paper. We generate the multivariate function of high degree F(X) . We construct the digital signature scheme using F(X). Our system is immune from the Gröbner bases attacks because obtaining parameters of F(X) to be secret keys arrives at solving the multivariate algebraic equations that is one...
متن کاملDigital identity-based multisignature scheme implementation
Digital signature, as an official signature, have many applications in information security, including authentication, data integrity, and non-repudiation. When a private or public document must be signed by a group of people, we call it multisignature scheme if all and every single member of the group signs the document. An identity-based digital multisignature is a multi signer digital signat...
متن کاملNew Digital Signature Scheme Using Polynomials Over Non- Commutative Groups
Digital signatures are probably the most important and widely used cryptographic primitive enabled by public key technology, and they are building blocks of many modern distributed computer applications, like, electronic contract signing, certified email, and secure web browsing etc. However, many existing signatures schemes lie in the intractability of problems closure to the number theory tha...
متن کاملSelf Proxy Signature Scheme*
The proxy signature scheme is a kind of digital signature scheme. In the proxy signature scheme, one user, called the original signer, can delegate his/her signing capability to another user called the proxy signer. This is similar to a person delegating his/her seal to another person in the real world. In this paper, we propose a new type of proxy signature scheme, the self proxy signature sch...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013