Skip to main content

Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001

  • Conference paper
  • First Online:
Progress in Cryptology — INDOCRYPT 2001 (INDOCRYPT 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2247))

Included in the following conference series:

  • 583 Accesses

Abstract

In this paper we will compare two signature schemes proposed by different sets of authors. One is the XTR-Nyberg-Rueppel signature proposed by A.K. Lenstra and E.R. Verheul in [3] and the other is the signature scheme proposed by C.H. Tan, X. Yi and C.K. Siew (We will call it TYS signature.) in [9]. XTR-NR signature uses the third degree trace projection Tr : GF(p 6) → GF(p 2) and has been generalized in [8] by Lim et. al. as a scheme in GF(p 6m) using Tr : GF(p 6m) → GF(p 2m). On the other hand, TYS signature is based on a third order LFSR. Tan et. al. claimed that TYS signature is as secure as Schnorr signature scheme. We will explain why these two schemes are essentially the same. In addition, we will point out that TYS signature as it is has some flaws in their arguments. We will show that in order to cure the flaws of TYS signature, one should bring in exactly the same security and efficiency consideration of XTR scheme as in [8].

Yie and Kim’s work was supported by Basic Science Research Institute Program, Korea Research Foundation 1998-015-D00017.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. E. Brouwer, R. Pellikaan, Eric R. Verheul, Doing More with Fewer Bits, Advances in Cryptology-Asiacrypt’99, LNCS 1716 (1999), pp. 321–332.

    Google Scholar 

  2. Arjen K. Lenstra, Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems over Finite Fields, ACISP’97 (1997), LNCS 1270, pp. 127–138.

    Google Scholar 

  3. Arjen K. Lenstra, Eric R. Verheul, The XTRpublic key system, Advances in Cryptology-CRYPTO’00 LNCS 1880 (2000), pp. 1–19

    Chapter  Google Scholar 

  4. Arjen K. Lenstra, Eric R. Verheul, Key improvements to XTR, Advances in Cryptology-Asiacrypt’00 LNCS 1976 (2000), pp. 220–233

    Chapter  Google Scholar 

  5. Arjen K. Lenstra, Eric R. Verheul, Selecting Cryptographic Key Sizes, http://www.cryptosavvy.com (1999).

  6. Arjen K. Lenstra, Eric R. Verheul, Fast irreduciblility and subgroup membership testing in XTR, Proceedings of the PKC’01 LNCS 1992 (2001), pp. 73–86

    Google Scholar 

  7. Rudolf Lidl, Harald Niederreiter, Introduction to finite fields and their applications, Cambridge, 1994.

    Google Scholar 

  8. Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim and Hongsub Lee, XTR Extended to GF(p 6m), to appear at SAC’01, LNCS (2001).

    Google Scholar 

  9. Chik How Tan, Xun Yi and Chee Kheong Siew, Signature Schemes Based on 3rd Order Shift Registers, ACISP’01, LNCS 2119 (2001), pp.445–459.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lim, S., Kim, S., Yie, I., Kim, J. (2001). Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. In: Rangan, C.P., Ding, C. (eds) Progress in Cryptology — INDOCRYPT 2001. INDOCRYPT 2001. Lecture Notes in Computer Science, vol 2247. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45311-3_29

Download citation

  • DOI: https://doi.org/10.1007/3-540-45311-3_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43010-0

  • Online ISBN: 978-3-540-45311-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics