The Modified Signature Scheme Based on Factoring and Discrete Logarithms

Eddie Shahril Ismail, N. M F Tahat

Research output: Contribution to journalArticle

Abstract

Laih and Kuo developed two highly secure and efficient signature schemes based on factoring and discrete logarithms. Unfortunately, their schemes require many keys for signing document and verifying signature. Li, Tzeng, and Hwang improved one of their schemes and managed to reduce the number of keys, but unfortunately the improved scheme was shown to be insecure by Qian, Chao, and Bao. In this paper, a new modified scheme of Li-Tzeng-Hwang is presented with two main results: The modified scheme requires fewer keys than the scheme by Laih and Kuo, and it is able to withstand many attacks including the one mentioned by Qian, Chao and Bao.

Original languageEnglish
Pages (from-to)245-249
Number of pages5
JournalInformation Security Journal
Volume20
Issue number4-5
DOIs
Publication statusPublished - Jan 2011

Fingerprint

Factoring
Attack

Keywords

  • cryptography
  • cryptology
  • digital signature
  • discrete logarithms
  • factoring
  • hard problems

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Information Systems and Management

Cite this

The Modified Signature Scheme Based on Factoring and Discrete Logarithms. / Ismail, Eddie Shahril; Tahat, N. M F.

In: Information Security Journal, Vol. 20, No. 4-5, 01.2011, p. 245-249.

Research output: Contribution to journalArticle

@article{0233eeb7581046c99e0fc3323d3cdbea,
title = "The Modified Signature Scheme Based on Factoring and Discrete Logarithms",
abstract = "Laih and Kuo developed two highly secure and efficient signature schemes based on factoring and discrete logarithms. Unfortunately, their schemes require many keys for signing document and verifying signature. Li, Tzeng, and Hwang improved one of their schemes and managed to reduce the number of keys, but unfortunately the improved scheme was shown to be insecure by Qian, Chao, and Bao. In this paper, a new modified scheme of Li-Tzeng-Hwang is presented with two main results: The modified scheme requires fewer keys than the scheme by Laih and Kuo, and it is able to withstand many attacks including the one mentioned by Qian, Chao and Bao.",
keywords = "cryptography, cryptology, digital signature, discrete logarithms, factoring, hard problems",
author = "Ismail, {Eddie Shahril} and Tahat, {N. M F}",
year = "2011",
month = "1",
doi = "10.1080/19393555.2011.607221",
language = "English",
volume = "20",
pages = "245--249",
journal = "Information Security Journal",
issn = "1939-3555",
publisher = "Taylor and Francis Ltd.",
number = "4-5",

}

TY - JOUR

T1 - The Modified Signature Scheme Based on Factoring and Discrete Logarithms

AU - Ismail, Eddie Shahril

AU - Tahat, N. M F

PY - 2011/1

Y1 - 2011/1

N2 - Laih and Kuo developed two highly secure and efficient signature schemes based on factoring and discrete logarithms. Unfortunately, their schemes require many keys for signing document and verifying signature. Li, Tzeng, and Hwang improved one of their schemes and managed to reduce the number of keys, but unfortunately the improved scheme was shown to be insecure by Qian, Chao, and Bao. In this paper, a new modified scheme of Li-Tzeng-Hwang is presented with two main results: The modified scheme requires fewer keys than the scheme by Laih and Kuo, and it is able to withstand many attacks including the one mentioned by Qian, Chao and Bao.

AB - Laih and Kuo developed two highly secure and efficient signature schemes based on factoring and discrete logarithms. Unfortunately, their schemes require many keys for signing document and verifying signature. Li, Tzeng, and Hwang improved one of their schemes and managed to reduce the number of keys, but unfortunately the improved scheme was shown to be insecure by Qian, Chao, and Bao. In this paper, a new modified scheme of Li-Tzeng-Hwang is presented with two main results: The modified scheme requires fewer keys than the scheme by Laih and Kuo, and it is able to withstand many attacks including the one mentioned by Qian, Chao and Bao.

KW - cryptography

KW - cryptology

KW - digital signature

KW - discrete logarithms

KW - factoring

KW - hard problems

UR - http://www.scopus.com/inward/record.url?scp=84860847097&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84860847097&partnerID=8YFLogxK

U2 - 10.1080/19393555.2011.607221

DO - 10.1080/19393555.2011.607221

M3 - Article

AN - SCOPUS:84860847097

VL - 20

SP - 245

EP - 249

JO - Information Security Journal

JF - Information Security Journal

SN - 1939-3555

IS - 4-5

ER -