ID-based signature scheme using the conic curve over Z n on two hard problems

Nedal Tahat, Eddie Shahril Ismail, Feras Bani-Ahmad

Research output: Contribution to journalArticle

Abstract

This paper proposes a new identity signature scheme on the conic curve over Z n. The scheme security is based on the factoring and discrete logarithms simultaneously. The paper gives the representation of the order and base point on C n(a, b), and introduces the representation of operation by parameters to simplify its calculation. The major advantage of our scheme is that it is very unlikely that the two assumptions can be efficiently solved simultaneously, and therefore offers a longer/higher security than that scheme based on a single cryptographic assumption. Furthermore,the numeric simulation for our scheme is presented. Some possible attacks will be considered, and our security analysis will show that none of them can successfully break any proposed schemes. In addition, our scheme protects the signer from chosen-message attack and also identifies a forged signature.

Original language English 443-452 10 International Journal of Pure and Applied Mathematics 77 3 Published - 2012

Fingerprint

Identity-based
Signature Scheme
Curve
Attack
Discrete Logarithm
Security Analysis
Factoring
Numerics
Simplify
Signature
Simulation

Keywords

• Chosen message attack
• Conic curve over Z
• Digital signature scheme
• Factoring problems
• Identification scheme

ASJC Scopus subject areas

• Mathematics(all)
• Applied Mathematics

Cite this

ID-based signature scheme using the conic curve over Z n on two hard problems. / Tahat, Nedal; Ismail, Eddie Shahril; Bani-Ahmad, Feras.

In: International Journal of Pure and Applied Mathematics, Vol. 77, No. 3, 2012, p. 443-452.

Research output: Contribution to journalArticle

@article{44eb5eb079824d81aff68210648e9616,
title = "ID-based signature scheme using the conic curve over Z n on two hard problems",
abstract = "This paper proposes a new identity signature scheme on the conic curve over Z n. The scheme security is based on the factoring and discrete logarithms simultaneously. The paper gives the representation of the order and base point on C n(a, b), and introduces the representation of operation by parameters to simplify its calculation. The major advantage of our scheme is that it is very unlikely that the two assumptions can be efficiently solved simultaneously, and therefore offers a longer/higher security than that scheme based on a single cryptographic assumption. Furthermore,the numeric simulation for our scheme is presented. Some possible attacks will be considered, and our security analysis will show that none of them can successfully break any proposed schemes. In addition, our scheme protects the signer from chosen-message attack and also identifies a forged signature.",
keywords = "Chosen message attack, Conic curve over Z, Digital signature scheme, Factoring problems, Identification scheme",
author = "Nedal Tahat and Ismail, {Eddie Shahril} and Feras Bani-Ahmad",
year = "2012",
language = "English",
volume = "77",
pages = "443--452",
journal = "International Journal of Pure and Applied Mathematics",
issn = "1311-8080",
number = "3",

}

TY - JOUR

T1 - ID-based signature scheme using the conic curve over Z n on two hard problems

AU - Tahat, Nedal

AU - Ismail, Eddie Shahril

PY - 2012

Y1 - 2012

N2 - This paper proposes a new identity signature scheme on the conic curve over Z n. The scheme security is based on the factoring and discrete logarithms simultaneously. The paper gives the representation of the order and base point on C n(a, b), and introduces the representation of operation by parameters to simplify its calculation. The major advantage of our scheme is that it is very unlikely that the two assumptions can be efficiently solved simultaneously, and therefore offers a longer/higher security than that scheme based on a single cryptographic assumption. Furthermore,the numeric simulation for our scheme is presented. Some possible attacks will be considered, and our security analysis will show that none of them can successfully break any proposed schemes. In addition, our scheme protects the signer from chosen-message attack and also identifies a forged signature.

AB - This paper proposes a new identity signature scheme on the conic curve over Z n. The scheme security is based on the factoring and discrete logarithms simultaneously. The paper gives the representation of the order and base point on C n(a, b), and introduces the representation of operation by parameters to simplify its calculation. The major advantage of our scheme is that it is very unlikely that the two assumptions can be efficiently solved simultaneously, and therefore offers a longer/higher security than that scheme based on a single cryptographic assumption. Furthermore,the numeric simulation for our scheme is presented. Some possible attacks will be considered, and our security analysis will show that none of them can successfully break any proposed schemes. In addition, our scheme protects the signer from chosen-message attack and also identifies a forged signature.

KW - Chosen message attack

KW - Conic curve over Z

KW - Digital signature scheme

KW - Factoring problems

KW - Identification scheme

UR - http://www.scopus.com/inward/record.url?scp=84861872988&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84861872988&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84861872988

VL - 77

SP - 443

EP - 452

JO - International Journal of Pure and Applied Mathematics

JF - International Journal of Pure and Applied Mathematics

SN - 1311-8080

IS - 3

ER -