Abstract
In this paper we will compare two signature schemes proposed by different sets of authors. One is the XTR-Nyberg-Rueppel signature proposed by A.K. Lenstra and E.R. Verheul in [3] and the other is the signature scheme proposed by C.H. Tan, X. Yi and C.K. Siew (We will call it TYS signature.) in [9]. XTR-NR signature uses the third degree trace projection Tr : GF(p 6) → GF(p 2) and has been generalized in [8] by Lim et. al. as a scheme in GF(p 6m) using Tr : GF(p 6m) → GF(p 2m). On the other hand, TYS signature is based on a third order LFSR. Tan et. al. claimed that TYS signature is as secure as Schnorr signature scheme. We will explain why these two schemes are essentially the same. In addition, we will point out that TYS signature as it is has some flaws in their arguments. We will show that in order to cure the flaws of TYS signature, one should bring in exactly the same security and efficiency consideration of XTR scheme as in [8].
Yie and Kim’s work was supported by Basic Science Research Institute Program, Korea Research Foundation 1998-015-D00017.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
A. E. Brouwer, R. Pellikaan, Eric R. Verheul, Doing More with Fewer Bits, Advances in Cryptology-Asiacrypt’99, LNCS 1716 (1999), pp. 321–332.
Arjen K. Lenstra, Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems over Finite Fields, ACISP’97 (1997), LNCS 1270, pp. 127–138.
Arjen K. Lenstra, Eric R. Verheul, The XTRpublic key system, Advances in Cryptology-CRYPTO’00 LNCS 1880 (2000), pp. 1–19
Arjen K. Lenstra, Eric R. Verheul, Key improvements to XTR, Advances in Cryptology-Asiacrypt’00 LNCS 1976 (2000), pp. 220–233
Arjen K. Lenstra, Eric R. Verheul, Selecting Cryptographic Key Sizes, http://www.cryptosavvy.com (1999).
Arjen K. Lenstra, Eric R. Verheul, Fast irreduciblility and subgroup membership testing in XTR, Proceedings of the PKC’01 LNCS 1992 (2001), pp. 73–86
Rudolf Lidl, Harald Niederreiter, Introduction to finite fields and their applications, Cambridge, 1994.
Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim and Hongsub Lee, XTR Extended to GF(p 6m), to appear at SAC’01, LNCS (2001).
Chik How Tan, Xun Yi and Chee Kheong Siew, Signature Schemes Based on 3rd Order Shift Registers, ACISP’01, LNCS 2119 (2001), pp.445–459.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, S., Kim, S., Yie, I., Kim, J. (2001). Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. In: Rangan, C.P., Ding, C. (eds) Progress in Cryptology — INDOCRYPT 2001. INDOCRYPT 2001. Lecture Notes in Computer Science, vol 2247. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45311-3_29
Download citation
DOI: https://doi.org/10.1007/3-540-45311-3_29
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43010-0
Online ISBN: 978-3-540-45311-6
eBook Packages: Springer Book Archive