Developing a digital signature scheme avoids attacks based on the order of the generator element
3 viewsDOI:
https://doi.org/10.54939/1859-1043.j.mst.101.2025.131-139Keywords:
Digital signature scheme; Discrete logarithm problem; Hash function.Abstract
In this paper, we propose a new digital signature scheme based on composite discrete logarithms, which is a variant of the DSA signature scheme. Our new proposed scheme is more secure than the DSA signature scheme. Furthermore, the speed of computing of our scheme is faster than to some similar schemes. For this season, it can be applied in practice.
References
[1]. Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Handbook Applied Cryptography, Webster Professor of Electrical Engineering and Computer Science”, Massachusetts Institute of Technology, (1996).
[2]. B. Yang, “A DSA-Based and Efficient Scheme for Preventing IP Prefix Hijacking”, International Conference on Management of e-Commerce and e-Government, Shanghai, pp. 87 - 92, (2014).
[3]. Binh V, Minh H. Nguyen, and Nikolay A. Moldovyan. "Digital Signature Schemes from Two Hard Problems." Multimedia and Ubiquitous Engineering. Springer, Dordrecht. 817-825, (2013).
[4]. Chik How Tan, Xun Yi and Chee Kheong Siew, “Signature scheme based on composite discrete logarithm”, Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint, pp. 1702 – 1706, (2003).
[5]. C. P. Schnorr, “Efficient signaturegeneration for smartcards”, Journal of Cryptology Vol. 4, pp. 161-174, (1991).
[6]. C. Y. Lu, W. C. Yang and C. S. Laih, “Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems”, International Conference on Broadband, Wireless Computing, communication and Applications, Fukuoka, pp. 401 - 406, (2010).
[7]. D.R Stinson, “Cryptography: Theory and Practice”, CRC Press, (2003).
[8]. FIPS PUB 186-4, “Digital Sinature Standrd (DSS)”, (2013).
[9]. GOST R 34.10-94. “Produce and check procedures of Electronic Digital Signature based on Asymmetric Cryptographic Algorithm, Russian Federation Standard”. Information Technology. Cryptographic data Security, Government Committee of the Russia for Standards, (1994).
[10]. H. Morita, J.C. Schuldt, T. Matsuda, G. Hanaoka, T. Iwata. “On the security of the schnorr signature scheme and DSA against related key attacks.” International Conference on Information Security and Cryptology ’15, pp. 20–35, Springer, (2015).
[11]. H. Zhang, R. Li, L. Li and Y. Dong, “Improved speed Digital Signature Algorithm based on modular inverse”, Proceedings of 2013 2nd International Conference on Measurement, Information and Con-trol, Harbin, pp. 706 – 710, (2013).
[12]. L. Xiao-fei, S. Xuan-jing and C. Hai-peng, “An Improved ElGamal Digital Signature Algorithm Based on Adding a Random Number”, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, Hubei, pp. 236 – 240, (2010).
[13]. M. Toorani and A. Beheshti Shirazi, “SSMS - A secure SMS messaging protocol for the m-payment systems,” IEEE Symposium on Computers and Communications, pp. 700–705, (2008).
[14]. National Institute of Standards and Technology (NIST), NIST Special Publication 800-57 Part1, (2020).
[15]. N. Saxena, N. S. Chaudhari, J. Thomas, "Solution to An Attack on Digital Signature in SMS Security” Department of Computer Science & Engineering Indian Institute of Technology Indore, India.
[16]. Okamoto E, “Key distribution systems based on identification information”. Proc. Of Crypto, (1987).
[17]. Richard Crandall, Carl Pomerance. “Prime Numbers, A Computational Perspective”, Second Edition, Springer Science Business Media, Inc, (2005).
[18]. T. S. Ng, S. Y. Tan and J. J. Chin, "A variant of Schnorr signature scheme with tight security reduc-tion" 2017 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea (South), pp. 411-415, (2017).
[19]. W. C. Kuo, "On ElGamal Signature Scheme," Future Generation Communication and Networking (FGCN 2007), Jeju, pp. 151-153, (2007).
[20]. https://en.wikipedia.org/wiki/Digital_Signature_ Algorithm.