Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Alternative signature generation procedures in the digital signature schemes based on the hidden discrete logarithm problem

View through CrossRef
Public-key cryptographic algorithms and protocols based on computational difficulty of the factorization problem and on the discrete logarithm problem are widely used in information-telecommunication systems. Currently the problem of construction of the post-quantum algorithms and protocols, i.e. cryptoschemes that are secure to potential attacks using quantum computers, represents a challenge in the area of applied and theoretic cryptography. In the literature the postquantum signature schemes based on the hidden discrete logarithm problem that is formulated in the finite non-commutativeassociative algebras were proposed. A disadvantage of such signature schemes is comparatively large size of the private key. The goal of the study is to develop an alternative signature generation procedures that will allow to reduce significantly the size of the private key. To achieve the goal, it is using the elements of the public key to compute the fixation vector at the first step of the signature formation procedure. As a result, there are designed alternative signature generation procedures in two known signature schemes based on the computational difficulty of the hidden discrete logarithm problem. Application of the proposed procedures gives possibility to reduce the size of the private key. The practical significance of the study is reduction the size of the protected memory in the electronic devices used for computation of the digital signatures.
Informatization and Communication Journal Editorial Board
Title: Alternative signature generation procedures in the digital signature schemes based on the hidden discrete logarithm problem
Description:
Public-key cryptographic algorithms and protocols based on computational difficulty of the factorization problem and on the discrete logarithm problem are widely used in information-telecommunication systems.
Currently the problem of construction of the post-quantum algorithms and protocols, i.
e.
cryptoschemes that are secure to potential attacks using quantum computers, represents a challenge in the area of applied and theoretic cryptography.
In the literature the postquantum signature schemes based on the hidden discrete logarithm problem that is formulated in the finite non-commutativeassociative algebras were proposed.
A disadvantage of such signature schemes is comparatively large size of the private key.
The goal of the study is to develop an alternative signature generation procedures that will allow to reduce significantly the size of the private key.
To achieve the goal, it is using the elements of the public key to compute the fixation vector at the first step of the signature formation procedure.
As a result, there are designed alternative signature generation procedures in two known signature schemes based on the computational difficulty of the hidden discrete logarithm problem.
Application of the proposed procedures gives possibility to reduce the size of the private key.
The practical significance of the study is reduction the size of the protected memory in the electronic devices used for computation of the digital signatures.

Related Results

New Forms of Defining the Hidden Discrete Logarithm Problem
New Forms of Defining the Hidden Discrete Logarithm Problem
There are introduced novel variants of defining the discrete logarithm problem in a hidden group, which represents interest for constructing post-quantum cryptographic protocols an...
A novel method for development of post-quantum digital signature schemes
A novel method for development of post-quantum digital signature schemes
Introduction: Development of post-quantum digital signature standards represents a current challenge in the area of cryptography. Recently, the signature schemes based on the hidde...
A post-quantum digital signature scheme on groups with four-dimensional cyclicity
A post-quantum digital signature scheme on groups with four-dimensional cyclicity
Introduction: Development of practical post-quantum signature schemes is a current challenge in the applied cryptography. Recently, several different forms of the hidden discrete l...
A New Method for Designing Post-Quantum Signature Schemes
A New Method for Designing Post-Quantum Signature Schemes
The current standards of the digital signature algorithms are based on computational difficulty of the discrete logarithm and factorization problems. Expected appearance in near fu...
Evaluation of the Coulomb logarithm using cutoff and screened Coulomb interaction potentials
Evaluation of the Coulomb logarithm using cutoff and screened Coulomb interaction potentials
The Coulomb logarithm is a fundamental plasma parameter which is commonly derived within the framework of the binary collision approximation. The conventional formula for the Coulo...
A Novel Method for Developing Post-quantum Digital Signature Algorithms on Non-commutative Associative Algebras
A Novel Method for Developing Post-quantum Digital Signature Algorithms on Non-commutative Associative Algebras
Introduction: Development of practical post-quantum signature algorithms is a current challenge in the area of cryptography. Recently, several candidates on post-quantum signature ...
In Times of Pandemic - How Generation XYZ Looks at Digital Banking
In Times of Pandemic - How Generation XYZ Looks at Digital Banking
The banking industry since pandemic has shifted servicing dramatically from its traditional branches to become far more digitally flexible. Banks rushed to face-lift the front-end ...
Novel Techniques for Classifying Exotic Spheres in High Dimensions
Novel Techniques for Classifying Exotic Spheres in High Dimensions
Discrete calculus deals with developing the concepts and techniques of differential and integral calculus in a discrete setting, often using difference equations and discrete funct...

Back to Top