Skip to main content

Digital Signature Algorithms Based on Hidden Discrete Logarithm Problem

  • Conference paper
  • First Online:
Frontiers in Intelligent Computing: Theory and Applications

Abstract

The discrete logarithm problem in a hidden group, which is defined over finite non-commutative associative algebras, represents interest for constructing post-quantum public-key cryptoschemes. The currently known form of the hidden logarithm problem suits well for designing the public-key agreement protocols and public encryption algorithms, but not suits for designing the digital signature algorithms. In the present paper, there are introduced novel forms of defining the hidden discrete logarithm problem, on the base of which two digital signature algorithms are proposed. Two different four-dimensional finite non-commutative associative algebras have been used in the proposed signature algorithms. In one of the proposed algorithms, there are used globally non-invertible vectors that are invertible locally. A large set of the left-side and a large set of the right-side local units relates to some fixed globally non-invertible vector. Several different local units are used to define one of the proposed forms of the hidden logarithm problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sirwan, A., Majeed, N.: New algorithm for wireless network communication security. Int. J. Cryptogr. Inf. Secur. 6(3/4), 1–8 (2016)

    Google Scholar 

  2. Yiteng, F., Guomin, Y., Joseph, K.L.: A new public remote integrity checking scheme with user and data privacy. Int. J. Appl. Cryptography. 3(3), 196–209 (2017)

    Article  MathSciNet  Google Scholar 

  3. Chiou, S.Y.: Novel digital signature schemes based on factoring and discrete logarithms. Int. J. Secur. Appl. 10(3), 295–310 (2016)

    Google Scholar 

  4. Poulakis, D.: A Variant of digital signature algorithm. Des. Codes Crypt. 51(1), 99–104 (2009)

    Article  MathSciNet  Google Scholar 

  5. Yan, S.Y.: Quantum Computational Number Theory, 252 p. Springer, Berlin (2015)

    Google Scholar 

  6. Yan, S.Y.: Quantum Attacks on Public-Key Cryptosystems, 207 p. Springer, Berlin (2014)

    Google Scholar 

  7. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on quantum computer. SIAM J. Comput. 26, 1484–1509 (1997)

    Article  MathSciNet  Google Scholar 

  8. Smolin, J.A., Smith, G., Vargo, A.: Oversimplifying quantum factoring. Nature 499(7457), 163–165 (2013)

    Article  Google Scholar 

  9. Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. NIST PQCrypto project. https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/call-for-proposals-final-dec-2016.pdf

  10. First NIST standardization conference—April 11–13, 2018. http://prometheuscrypt.gforge.inria.fr/2018-04-18.pqc2018.html

  11. Post-Quantum Cryptography. In: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9–11, 2018, Proceedings. Lecture Notes in Computer Science Series, vol. 10786. Springer, Berlin (2018)

    Google Scholar 

  12. Proceedings of the 7th International Workshop on Post-Quantum Cryptography, PQCrypto 2016. Fukuoka, Japan, February 24–26, 2016, Lecture Notes in Computer Science (LNCS) Series, vol. 9606, 270 p. Springer, Berlin (2016)

    Google Scholar 

  13. Verma, G.K.: A proxy blind signature scheme over braid groups. Int. J. Netw. Secur. 9(3), 214–217 (2009)

    Google Scholar 

  14. Hiranvanichakorn, P.: Provably authenticated group key agreement based on braid groups—the dynamic case. Int. J. Netw. Secur. 19(4), 517–527 (2017)

    Google Scholar 

  15. Myasnikov, A., Shpilrain, V., Ushakov, A.: A practical attack on a braid group based cryptographic protocol. In: Advances in Cryptology—CRYPTO’05/Lecture Notes in Computer Science, vol. 3621, pp. 86–96. Springer, Berlin (2005)

    Google Scholar 

  16. Chaturvedi, A., Lal, S.: An authenticated key agreement protocol using conjugacy problem in braid groups. Int. J. Netw. Secur. 6(2), 181–184 (2008)

    Google Scholar 

  17. Verma, G.K.: Probable security proof of a blind signature scheme over braid groups. Int. J. Netw. Secur. 12(2), 118–120 (2011)

    Google Scholar 

  18. Moldovyan, D.N.: Non-commutative finite groups as primitive of public-key cryptoschemes. Quasigroups Relat. Syst. 18, 165–176 (2010)

    MATH  Google Scholar 

  19. Moldovyan, D.N., Moldovyan, N.A.: Cryptoschemes over hidden conjugacy search problem and attacks using homomorphisms. Quasigroups Relat. Syst. 18, 177–186 (2010)

    MathSciNet  MATH  Google Scholar 

  20. Kuzmin, A.S., Markov, V.T., Mikhalev, A.A., Mikhalev, A.V., Nechaev, A.A.: cryptographic algorithms on groups and algebras. J. Math. Sci. 223(5), 629–641 (2017)

    Article  MathSciNet  Google Scholar 

  21. Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4, 161–174 (1991)

    Article  Google Scholar 

  22. Moldovyan, N.A.: Unified method for defining finite associative algebras of arbitrary even dimensions. Quasigroups Relat. Syst. 26(2), 263–270 (2018) 

    Google Scholar 

Download references

Support for Research

This work was partially supported by the Russian Foundation for Basic Research in the framework of the project No. 18-07-00932-a.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hieu Minh Nguyen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Moldovyan, A.A., Moldovyan, N.A., Phieu, N.H., Tran, C.M., Nguyen, H.M. (2020). Digital Signature Algorithms Based on Hidden Discrete Logarithm Problem. In: Satapathy, S., Bhateja, V., Nguyen, B., Nguyen, N., Le, DN. (eds) Frontiers in Intelligent Computing: Theory and Applications. Advances in Intelligent Systems and Computing, vol 1014. Springer, Singapore. https://doi.org/10.1007/978-981-13-9920-6_1

Download citation

Publish with us

Policies and ethics