Phát triển một lược đồ chữ ký số chống lại các tấn công dựa trên bậc của phần tử sinh
3 lượt xemDOI:
https://doi.org/10.54939/1859-1043.j.mst.101.2025.131-139Từ khóa:
Lược đồ chữ ký số; Bài toán logarit rời rạc; Hàm Hash.Tóm tắt
Trong bài báo này, chúng tôi đề xuất một lược đồ chữ ký số mới dựa trên bài toán logarith rời rạc, đây là một biến thể của lược đồ chữ ký DSA. Lược đồ đề xuất của chúng tôi an toàn hơn lược đồ chữ ký DSA. Ngoài ra, tốc độ tính toán của lược đồ đề xuất của chúng tôi nhanh hơn một số lược đồ cùng loại. Chính vì vậy, lược đồ đề xuất có thể được áp dụng vào trong thực tế.
Tài liệu tham khảo
[1]. Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Handbook Applied Cryptography, Webster Professor of Electrical Engineering and Computer Science”, Massachusetts Institute of Technology, (1996).
[2]. B. Yang, “A DSA-Based and Efficient Scheme for Preventing IP Prefix Hijacking”, International Conference on Management of e-Commerce and e-Government, Shanghai, pp. 87 - 92, (2014). DOI: https://doi.org/10.1109/ICMeCG.2014.27
[3]. Binh V, Minh H. Nguyen, and Nikolay A. Moldovyan. "Digital Signature Schemes from Two Hard Problems." Multimedia and Ubiquitous Engineering. Springer, Dordrecht. 817-825, (2013). DOI: https://doi.org/10.1007/978-94-007-6738-6_100
[4]. Chik How Tan, Xun Yi and Chee Kheong Siew, “Signature scheme based on composite discrete logarithm”, Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint, pp. 1702 – 1706, (2003). DOI: https://doi.org/10.1109/ICICS.2003.1292757
[5]. C. P. Schnorr, “Efficient signaturegeneration for smartcards”, Journal of Cryptology Vol. 4, pp. 161-174, (1991). DOI: https://doi.org/10.1007/BF00196725
[6]. C. Y. Lu, W. C. Yang and C. S. Laih, “Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems”, International Conference on Broadband, Wireless Computing, communication and Applications, Fukuoka, pp. 401 - 406, (2010). DOI: https://doi.org/10.1109/BWCCA.2010.104
[7]. D.R Stinson, “Cryptography: Theory and Practice”, CRC Press, (2003).
[8]. FIPS PUB 186-4, “Digital Sinature Standrd (DSS)”, (2013).
[9]. GOST R 34.10-94. “Produce and check procedures of Electronic Digital Signature based on Asymmetric Cryptographic Algorithm, Russian Federation Standard”. Information Technology. Cryptographic data Security, Government Committee of the Russia for Standards, (1994).
[10]. H. Morita, J.C. Schuldt, T. Matsuda, G. Hanaoka, T. Iwata. “On the security of the schnorr signature scheme and DSA against related key attacks.” International Conference on Information Security and Cryptology ’15, pp. 20–35, Springer, (2015). DOI: https://doi.org/10.1007/978-3-319-30840-1_2
[11]. H. Zhang, R. Li, L. Li and Y. Dong, “Improved speed Digital Signature Algorithm based on modular inverse”, Proceedings of 2013 2nd International Conference on Measurement, Information and Con-trol, Harbin, pp. 706 – 710, (2013). DOI: https://doi.org/10.1109/MIC.2013.6758059
[12]. L. Xiao-fei, S. Xuan-jing and C. Hai-peng, “An Improved ElGamal Digital Signature Algorithm Based on Adding a Random Number”, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, Hubei, pp. 236 – 240, (2010). DOI: https://doi.org/10.1109/NSWCTC.2010.190
[13]. M. Toorani and A. Beheshti Shirazi, “SSMS - A secure SMS messaging protocol for the m-payment systems,” IEEE Symposium on Computers and Communications, pp. 700–705, (2008). DOI: https://doi.org/10.1109/ISCC.2008.4625610
[14]. National Institute of Standards and Technology (NIST), NIST Special Publication 800-57 Part1, (2020).
[15]. N. Saxena, N. S. Chaudhari, J. Thomas, "Solution to An Attack on Digital Signature in SMS Security” Department of Computer Science & Engineering Indian Institute of Technology Indore, India.
[16]. Okamoto E, “Key distribution systems based on identification information”. Proc. Of Crypto, (1987). DOI: https://doi.org/10.1007/3-540-48184-2_15
[17]. Richard Crandall, Carl Pomerance. “Prime Numbers, A Computational Perspective”, Second Edition, Springer Science Business Media, Inc, (2005).
[18]. T. S. Ng, S. Y. Tan and J. J. Chin, "A variant of Schnorr signature scheme with tight security reduc-tion" 2017 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea (South), pp. 411-415, (2017). DOI: https://doi.org/10.1109/ICTC.2017.8191014
[19]. W. C. Kuo, "On ElGamal Signature Scheme," Future Generation Communication and Networking (FGCN 2007), Jeju, pp. 151-153, (2007). DOI: https://doi.org/10.1109/FGCN.2007.173
[20]. https://en.wikipedia.org/wiki/Digital_Signature_ Algorithm.