Generalized Powering Functions and Their Application to Digital Signatures(Digital Signature, <Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayness is secure under the factoring assumption. The previously reported encryption schemes using a powering function are variants of either the 4-to-1 mapping or higher n-to-1 mapping, where n>4. In this paper, we propose an optimized powering function that is a 3-to-1 mapping using a p^2q-type modulus. The one-wayness of the proposed powering function is as hard as the infeasibility of the factoring problem. We present an efficient algorithm for computing the decryption for a p^2q-type modulus, which requires neither modular inversion nor division. Moreover, we construct new provably secure digital signatures as an application of the optimized functions. In order to achieve provable security in the random oracle model, we usually randomize a message using random hashing or padding. However, we have to compute the randomization again if the randomized message is a non-cubic residue element--it is inefficient for long messages. We propose an algorithm that can deterministically find the unique cubic residue element for a randomly chosen element.
- 社団法人電子情報通信学会の論文
- 2006-01-01
著者
-
TEZUKA Satoru
Systems Development Laboratory, Hitachi Ltd.
-
TAKARAGI Kazuo
Systems Development Laboratory, Hitachi Ltd.
-
Takagi Tsuyoshi
Future Univ.‐hakodate Hakodate‐shi Jpn
-
Takagi Tsuyoshi
School Of Systems Information Science Future University-hakodate
-
Takaragi Kazuo
Systems Development Laboratory Hitachi Ltd.
-
Tezuka Satoru
Systems Development Laboratory Hitachi Ltd.
-
SATO Hisayoshi
Systems Development Laboratory, Hitachi, Ltd.
-
Sato Hisayoshi
Systems Development Laboratory Hitachi Ltd.
-
TEZUKA Satoru
Systems Development Laboratory, Hitachi, Ltd.
-
TAKARAGI Kazuo
Systems Development Labora-tory, Hitachi, Ltd.
関連論文
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- Group Cipher System for Intranet Security (Special Section on Cryptography and Information Security)
- Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing
- Efficient Implementation of the Pairing on Mobilephones Using BREW
- FOREWORD
- A New Keystream Generator MUGI (Symmetric Cipher) (Cryptography and Information Security)
- Generalized Powering Functions and Their Application to Digital Signatures(Digital Signature, Cryptography and Information Security)
- Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem(Elliptic Curve Cryptography, Cryptography and Information Security)
- Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
- Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
- Use of Statistically Adaptive Accumulation to Improve Video Watermark Detection (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- 動き検出を利用したMPEGエンコーダ向け動画用電子透かし
- Defeating Simple Power Analysis on Koblitz Curves(Discrete Mathematics and Its Applications)
- Security Analysis of the SPA-Resistant Fractional Width Method(Elliptic Curve Cryptography, Cryptography and Information Security)
- A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems(Discrete Mathematics and Its Applications)
- Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3
- A More Compact Representation of XTR Cryptosystem
- Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors(Elliptic Curve Cryptography, Cryptography and Information Security)
- Some Efficient Algorithms for the Final Exponentiation of ηT Pairing
- Universal ηT pairing algorithm over arbitrary extension degree (ワイドバンドシステム)
- Universal ηT pairing algorithm over arbitrary extension degree (情報セキュリティ)
- Universal ηT pairing algorithm over arbitrary extension degree (情報理論)
- Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
- Use of Statistically Adaptive Accumulation to Improve Video Watermark Detection
- Development of phased mission analysis method for large plants.