RSA /2002/13(08) , ); , ) RSA RSA : RSA RSA [2] , [1,4]

Size: px
Start display at page:

Download "RSA /2002/13(08) , ); , ) RSA RSA : RSA RSA [2] , [1,4]"

Transcription

1 /2002/13( Journal of Software Vol13, No8 RSA 1,2 1, 1 (, ; 2 (, E-mal: yfhu@fudaneducn : RSA RSA :, ; RSA,,, RSA,, : ; RSA ; ;RSA; : TP309 : A RSA [1],,,, RSA [2], [3], [1,4] ; :,, RSA, RSA RSA RSA : RSA n r z Z * n, y Z * n, y r =z r : RSA RSA RSA 12 RSA Flexble RSA : RSA n z Z * n, r y, y r =z (r>1,y Z * n : ; : : ( : (1968,,,,, ; (1940,,,,,,

2 1730 Journal of Software 2002,13(8 r : flexble RSA RSA flexble RSA RSA :RSA, r z ; RSA, r z RSA [2], RSA, 13 RSA : (random self-reducton, n r, z Z * n, y=z 1/r, : z * Zn, y = 1 / z r, : z, s Z * n, z =s r z, y= y /s RSA, n z, RSA n z, RSA Flexble RSA, RSA, RSA 14 (adaptve chosen message attack :, ;,,,, ; ;,,, :, 15 (unversal one-way famly of ash functon, UOWFs [3] ( k, : x k, y(y x, k (x= k (y [5,6], k ; 2 l l,l+1<l l=160,l =512, 2 l SA-1 n, QR n n l p q, p=2p +1,q=2q +1,p q n=pq, : h,x QR n ;l+1 : (n,h,x, : (p,q m, l+1 e(e y (y QR n e xh ( x y =, y x ( ( m y = h, n y : (e,y,y m (e,y,y, :

3 : RSA 1731 (1 e l+1 ( m (2 ( e x = y h (x (3 y e x = h 21, e, h h 1, y a, x=h a mod p q, a, h QR n, d=e 1 mod p q, y=h b, b=da+d(x mod p q, y h b [7],, 22 1 RSA, 1, 1 x,y Z * n a,b Z, x a =y b,gcd(a,b=1, x [8] * Zn, x a =y, Eucldean, b k, bb =1+ak x =x b y k 1 1 t, 1 t, m ( m,(e,y,y, x = ( y h (e,y,y m ( m 1 t, ( m ( e x = y h 3 : 1 j t,e=e j,x =x j 1 j t,e=e j,x x j 1 t,e e e, e RSA RSA, [4], RSA,, RSA, n, z Z * n l+1 r, z 1/r 2Π l+1 e 1,,e t, h = z e ; w Z * 2Π n, x = w e ;, =r ( m e m, y QR n, x = ( y h ( x y = xh y x h e, m (e,y,y, 1 j t,e=e j x =x j, : ( y = x h ( m ( y = x h j ( m j, (m (m j, v Z n a0(mod, z 2 Π :v =h a = a e gcd(2a e,=1,=r 1, z r RSA, RSA : n,z Z * n r, z r : j ;

4 1732 Journal of Software 2002,13(8, : 2 Π e j 1 t( j, l+1 e, e j =r l+1, h = z w Z * n, y j = w u Z * n, x j =u 2 ( x j j x = y j h e 2Π je ( m, m j y QR n, x = ( y h x h e, y =j h x j, y j y j, m (e,y,y e=e j,x x j, y e (x = xh, e ( x j y j = xh, z r RSA, felxble RSA n,z Z * n, r(r>1 z r : l+1,e 1,,e t, h a {1,,n 2 }, x=h a e Π e = z 2 QR n p q h QR n, a=bp q +c, 0 c<p q a,c {0,,p q 1}, c,b {0,, n 2 /p q } c b c, x QR n x h, (e,y,y,m=2π e (a+(x y e =xh (x =z m d=gcd(e,m gcd(d,2p q =1 y e/d =z m/d, e³m( e m, 1 z (e/d, e³m r e, r³2π e, r³(a+(x : a=bp q +c( r c,c b r³p q, a+(x 0(mod r 1/r,r³(a+(x 1 z r, RSA 3 ( m m (e,y,y ( e e (x x = y h, y = xh (x, : g 1,g 2 s G (s l+1 m hash, α = ( ( m α, g t g 1 2,,t mod s hash α t g 2 g 1 m α;, m, t l p q, p=2p +1,q=2q +1,p q n=pq, : h,x QR n ; s G, s l+1, G g 1 g 2

5 : RSA 1733 : (n,h,x,g 1,g 2 G ( s : (p,q m, l+1 e t Z s t ( m ( g e g xh 1 2 y =, y :(e,y,t t ( m ( g g m (e,y,t, e l+1, x = y e h RSA G, 1 hash,,, s, m 4 RSA RSA :, ; RSA,,, :, RSA, SA-1 [6] : 1, Vsual C++ 60, Dell P, OptPlex GX1, Mcrosoft Wndows Bts Table 1 The tmes of basc arthmetc operatons (as a baselne Basc operatons 1 ( Modular multplcaton (µs Squarng operaton (µs Exponentaton (ms ,,,, Table 2 The tmes of the algorthms 2 Phase Modulus Key set-up phase (ms Man sgnng phase (ms Sgnature verfcaton (ms , References: [1] Goldwasser, S, Mcal, S, Rvest, RL A dgtal sgnature scheme secure aganst adaptve chosen-message attacks SIAM Journal on Computng, 1988,17(2:281308

6 1734 Journal of Software 2002,13(8 [2] Barc, N, Pftzmann, B Collson-Free accumulators and fal-stop sgnature schemes wthout trees In: Fumy, W, ed Proceedngs of the Conference on Advances n Cryptology (EUROCRYPT 97 Berln, New York: Sprnger-Verlag, [3] Naor, M, Yung, M Unversal one-way hash functons and ther cryptographc applcatons In: Johnson, DS, ed Proceedngs of the 21st Annual ACM Symposum on Theory of Computng (STOC 89 Seattle, WA, New York: ACM Press, [4] Cramer, R, Amgaard, I New generaton of secure and practcal RSA-based sgnatures In: Kobltz, N, ed Proceedngs of the 16th Annual Internatonal Conference on Advances n Cryptology (CRYPTO 96 Santa Barbara, CA, New York: Sprnger-Verlag, [5] Bellare, M, Rogaway, P Collson-resstant hashng: towards makng UOWFs practcal In: Proceedngs of the 17th Annual Internatonal Conference on Advances n Cryptology (CRYPTO 97 Santa Barbara, CA, New York: Sprnger-Verlag, 1997 [6] Shoup, V A composton theorem for unversal one-way hash functons In: Proceedngs of the Workshop on Advances n Cryptology (EUROCRYPT 2000 New York: Sprnger-Verlag, 2000 [7] Lm, C, Lee, PJ More flexble exponentaton wth precomputaton In: Desmedt, YG, ed Proceedngs of the Conference on Advances n Cryptology (CRYPTO 94 Santa Barbara, CA, New York: Sprnger-Verlag, [8] Gullou, LC, Qusquater, JJ A practcal zero-knowledge protocol ftted to securty mcroprocessor mnmzng both transmsson and memory In: Günther, CG ed Proceedngs of the Conference on Advances n Cryptology (EUROCRYPT 88 Davos, Swtzerland, New York: Sprnger-Verlag, A Sgnature Scheme Based on the Strong RSA Assumpton WANG Bao-you 1,2, U Yun-fa 1 1 (Department of Computer Scence and Engneerng, Fudan Unversty, Shangha , Chna; 2 (Chna UnCmm Lmted Shangha Branch, Shangha , Chna E-mal: yfhu@fudaneducn Abstract: For resstng the adaptve chosen message attack and mprovng the sgn generaton effcency, a sgnature scheme based on the strong RSA assumpton s descrbed n ths paper The scheme uses a fxed base rather than by rasng them to a fxed power, whch s dfferent from the RSA algorthm Moreover, one can use pre-computaton technques n order to get a better effcency In addton, a hash functon can be ncorporated nto the scheme n such a way that t offers a trapdoor to the sgn algorthm The merts of ths amendatory scheme are that f one makes a dstncton between the off lne and the on lne cost of sgnng, the sgner can reduce on lne cost sgnfcantly by usng hash trapdoor It s proved that the scheme s secure aganst the adaptve chosen message attack under the strong RSA assumpton The expermental results show that the scheme has hgh effcency Key words: dgtal sgnature; strong RSA assumpton (SRA; hash functon; RSA; securty Receved May 15, 2001; accepted October 23, 2001 Supported by the Natonal Natural Scence Foundaton of Chna under Grant No

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Provable Security Signatures

Provable Security Signatures Provable Securty Sgnatures UCL - Louvan-la-Neuve Wednesday, July 10th, 2002 LIENS-CNRS Ecole normale supéreure Summary Introducton Sgnature FD PSS Forkng Lemma Generc Model Concluson Provable Securty -

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

The Improved Montgomery Scalar Multiplication Algorithm with DPA Resistance Yanqi Xu, Lin Chen, Moran Li

The Improved Montgomery Scalar Multiplication Algorithm with DPA Resistance Yanqi Xu, Lin Chen, Moran Li nd Internatonal Conference on Electrcal, Computer Engneerng and Electroncs (ICECEE 015) The Improved Montgomery Scalar Multplcaton Algorthm wth DPA Resstance Yanq Xu, Ln Chen, Moran L Informaton Scence

More information

Cryptanalysis of Threshold Proxy Signature Schemes 1)

Cryptanalysis of Threshold Proxy Signature Schemes 1) MM Research Preprnts, 226 233 MMRC, AMSS, Academa Snca No. 23, December 24 Cryptanalyss of Threshold Proxy Sgnature Schemes 1) Zuo-Wen Tan and Zhuo-Jun Lu Key Laboratory of Mathematcs Mechanzaton Insttute

More information

Hash functions : MAC / HMAC

Hash functions : MAC / HMAC Hash functons : MAC / HMAC Outlne Message Authentcaton Codes Keyed hash famly Uncondtonally Secure MACs Ref: D Stnson: Cryprography Theory and Practce (3 rd ed), Chap 4. Unversal hash famly Notatons: X

More information

Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations

Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations Use of Sparse and/or Complex Exponents n Batch Verfcaton of Exponentatons Jung Hee Cheon 1 and Dong Hoon Lee 2 1 Department of Mathematcs, Seoul Natonal Unversty jhcheon@math.snu.ac.kr, 2 Natonal Securty

More information

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s

More information

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm www.ijcsi.org 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce

More information

Performance Analysis of the Postcomputation- Based Generic-Point Parallel Scalar Multiplication Method

Performance Analysis of the Postcomputation- Based Generic-Point Parallel Scalar Multiplication Method P a g e 3 Vol. 1 Issue 11 (Ver. 1.) October 1 Global Journal of Computer Scence and Technology Performance Analyss of the Postcomputaton- Based Generc-Pont Parallel Scalar Multplcaton Method Tur F. Al-Soman

More information

A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme*

A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme* A Model of Blnear-Parngs Based Desgnated-Verfer Proxy Sgnatue Scheme Fengyng L,, Qngshu Xue, Jpng Zhang, Zhenfu Cao Department of Educaton Informaton Technology, East Chna Normal Unversty, 0006, Shangha,

More information

Fast Variants of RSA

Fast Variants of RSA Fast Varants of RSA Dan Boneh dabo@cs.stanford.edu Hovav Shacham hovav@cs.stanford.edu Abstract We survey four varants of RSA desgned to speed up RSA decrypton and sgnng. We only consder varants that are

More information

Augmented Broadcaster Identity-based Broadcast Encryption

Augmented Broadcaster Identity-based Broadcast Encryption Augmented Broadcaster Identty-based Broadcast Encrypton Janhong Zhang Yuwe Xu Zhpeng Chen Insttuton of Image Processng and Pattern Recognton North Chna Unversty of Technology Bejng Chna 100144 ywxupaper@163com

More information

Improved Integral Cryptanalysis of FOX Block Cipher 1

Improved Integral Cryptanalysis of FOX Block Cipher 1 Improved Integral Cryptanalyss of FOX Block Cpher 1 Wu Wenlng, Zhang Wentao, and Feng Dengguo State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences, Bejng 100080,

More information

Bit-Parallel Word-Serial Multiplier in GF(2 233 ) and Its VLSI Implementation. Dr. M. Ahmadi

Bit-Parallel Word-Serial Multiplier in GF(2 233 ) and Its VLSI Implementation. Dr. M. Ahmadi Bt-Parallel Word-Seral Multpler n GF(2 233 ) and Its VLSI Implementaton Supervsors: Student: Dr. Huapeng Wu Dr. M. Ahmad Wenka Tang Contents Introducton to Fnte Feld Research Motvatons Proposed Multplers

More information

Quantum secure circuit evaluation

Quantum secure circuit evaluation Scence n Chna Ser. F Informaton Scences 2004 Vol.47 No.6 717 727 717 Quantum secure crcut evaluaton CHEN Huanhuan, LI Bn & ZHUANG Zhenquan Department of Electronc Scence and Technology, Unversty of Scence

More information

Comment on An arbitrated quantum signature scheme. with fast signing and verifying

Comment on An arbitrated quantum signature scheme. with fast signing and verifying Comment on n arbtrated quantum sgnature scheme wth fast sgnng and verfyng Y-Png Luo and Tzonelh Hwang * Department of Computer cence and Informaton Engneerng, Natonal Cheng ung Unversty, No, Unversty Rd,

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of

More information

Finding Malleability in NTRUSign

Finding Malleability in NTRUSign Fndng Malleablty n TRUSgn SungJun Mn, Go Yamamoto, and Kwangjo Km Auto-ID Labs Whte Paper WP-HARDWARE-33 Sungjun Mn Senor Researcher, atonal Computerzaton Agency Go Yamamoto Senor Researcher, Informaton

More information

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00 CHALMERS GÖTEBORGS UNIVERSITET CRYPTOGRAPHY TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00 No extra materal s allowed durng the exam except for pens and a smple calculator (not smartphones).

More information

, RCL2000, 2002 Journal of Software. Vol.13, No /2002/13(08)

, RCL2000, 2002 Journal of Software. Vol.13, No /2002/13(08) 000-985/00/3085-07 00 Journal of Software Vol3 No8 00080 E-mal dgy@ercstscasaccn; l_kelong@snacom http//wwwercstaccn/ CLTrole-based constrants language wth tme-character CLT CLT LCT ; ; ; T309 A role-based

More information

Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings

Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings Internatonal Journal of Informaton and Educaton Technology Vol No 4 August 0 Securty Vulnerablty n Identty-Based ublc Key Cryptosystems from arngs Jyh-aw Yeh Abstract Many dentty-based lc key cryptosystems

More information

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,

More information

Advanced Algebraic Algorithms on Integers and Polynomials

Advanced Algebraic Algorithms on Integers and Polynomials Advanced Algebrac Algorthms on Integers and Polynomals Analyss of Algorthms Prepared by John Ref, Ph.D. Integer and Polynomal Computatons a) Newton Iteraton: applcaton to dvson b) Evaluaton and Interpolaton

More information

Semantic Security of RSA. Semantic Security

Semantic Security of RSA. Semantic Security Semantic Security of RSA Murat Kantarcioglu Semantic Security As before our goal is to come up with a public key system that protects against more than total break We want our system to be secure against

More information

A New Biometric Identity Based Encryption Scheme

A New Biometric Identity Based Encryption Scheme NEYIRE DENIZ SARIER (2008). A New Bometrc Identty Based Encrypton Scheme. In Techncal Sessons for 2008 Internatonal Symposum on Trusted Computng (TrustCom 2008) n Proceedngs of the 9th Internatonal Conference

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/18.401J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) What data structures

More information

COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD

COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD Ákos Jósef Lengyel, István Ecsed Assstant Lecturer, Professor of Mechancs, Insttute of Appled Mechancs, Unversty of Mskolc, Mskolc-Egyetemváros,

More information

A Threshold Digital Signature Issuing Scheme without Secret Communication

A Threshold Digital Signature Issuing Scheme without Secret Communication A Threshold Dgtal Sgnature Issung Scheme wthout Secret Communcaton Kazuo Takarag, Kunhko Myazak, Masash Takahash Systems Development Laboratory, Htach, Ltd e-mal: {takara, kunhko, takahas}@sdlhtachcop

More information

Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key

Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key Cryptanalyss of Some Double-Block-Length Hash Modes of Block Cphers wth n-bt Block and n-bt Key Deukjo Hong and Daesung Kwon Abstract In ths paper, we make attacks on DBL (Double-Block-Length) hash modes

More information

Forward-Secure Signatures with Optimal Signing and Verifying

Forward-Secure Signatures with Optimal Signing and Verifying Forward-Secure Sgnatures wth Optmal Sgnng and Verfyng Gene Itks Leond Reyzn Boston Unversty Computer Scence Dept. 111 Cummngton St. Boston, MA 02215, USA {tks,reyzn}@bu.edu Abstract Ordnary dgtal sgnatures

More information

Separable Linkable Threshold Ring Signatures

Separable Linkable Threshold Ring Signatures Separable Lnkable Threshold Rng Sgnatures Patrck P. Tsang 1, Vctor K. We 1, Tony K. Chan 1, Man Ho Au 1, Joseph K. Lu 1, and Duncan S. Wong 2 1 Department of Informaton Engneerng The Chnese Unversty of

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Line Drawing and Clipping Week 1, Lecture 2

Line Drawing and Clipping Week 1, Lecture 2 CS 43 Computer Graphcs I Lne Drawng and Clppng Week, Lecture 2 Davd Breen, Wllam Regl and Maxm Peysakhov Geometrc and Intellgent Computng Laboratory Department of Computer Scence Drexel Unversty http://gcl.mcs.drexel.edu

More information

Efficient Fixed Base Exponentiation and Scalar Multiplication based on a Multiplicative Splitting Exponent Recoding

Efficient Fixed Base Exponentiation and Scalar Multiplication based on a Multiplicative Splitting Exponent Recoding Effcent Fxed Base Exponentaton and Scalar Multplcaton based on a Multplcatve Splttng Exponent Recodng Jean-Marc Robert, Chrstophe Negre, Thomas Plantard To cte ths verson: Jean-Marc Robert, Chrstophe Negre,

More information

Fast Signature Generation with a. Fiat Shamir { Like Scheme. Fachbereich Mathematik / Informatik. Abstract

Fast Signature Generation with a. Fiat Shamir { Like Scheme. Fachbereich Mathematik / Informatik. Abstract Fast Signature Generation with a Fiat Shamir { Like Scheme H. Ong Deutsche Bank AG Stuttgarter Str. 16{24 D { 6236 Eschborn C.P. Schnorr Fachbereich Mathematik / Informatik Universitat Frankfurt Postfach

More information

Transitive Signatures Based on Non-adaptive Standard Signatures

Transitive Signatures Based on Non-adaptive Standard Signatures Transitive Signatures Based on Non-adaptive Standard Signatures Zhou Sujing Nanyang Technological University, Singapore, zhousujing@pmail.ntu.edu.sg Abstract. Transitive signature, motivated by signing

More information

The Cramer-Shoup Strong-RSA Signature Scheme Revisited

The Cramer-Shoup Strong-RSA Signature Scheme Revisited The Cramer-Shoup Strong-RSA Signature Scheme Revisited Marc Fischlin Johann Wolfgang Goethe-University Frankfurt am Main, Germany marc @ mi.informatik.uni-frankfurt.de http://www.mi.informatik.uni-frankfurt.de/

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

Message modification, neutral bits and boomerangs

Message modification, neutral bits and boomerangs Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental

More information

Construction and Traversal of Hash Chain with Public Links

Construction and Traversal of Hash Chain with Public Links Constructon and Traversal of Hash Chan wth Publc Lnks Vpul Goyal OSP Global Mumba, Inda vgoyal@ospglobal.com Abstract Current hash chan traversal technques requre that the ntermedate lnks of the hash chan

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

Improving the Round Complexity of VSS in Point-to-Point Networks

Improving the Round Complexity of VSS in Point-to-Point Networks Improvng the Round Complexty of VSS n Pont-to-Pont Networks Jonathan Katz Chu-Yuen Koo Rant Kumaresan Abstract We revst the followng queston: what s the optmal round complexty of verfable secret sharng

More information

Math Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University

Math Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University Math Revew CptS 223 dvanced Data Structures Larry Holder School of Electrcal Engneerng and Computer Scence Washngton State Unversty 1 Why do we need math n a data structures course? nalyzng data structures

More information

Decision Diagrams Derivatives

Decision Diagrams Derivatives Decson Dagrams Dervatves Logc Crcuts Desgn Semnars WS2010/2011, Lecture 3 Ing. Petr Fšer, Ph.D. Department of Dgtal Desgn Faculty of Informaton Technology Czech Techncal Unversty n Prague Evropský socální

More information

Lecture 3 January 31, 2017

Lecture 3 January 31, 2017 CS 224: Advanced Algorthms Sprng 207 Prof. Jelan Nelson Lecture 3 January 3, 207 Scrbe: Saketh Rama Overvew In the last lecture we covered Y-fast tres and Fuson Trees. In ths lecture we start our dscusson

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

An adaptive SMC scheme for ABC. Bayesian Computation (ABC)

An adaptive SMC scheme for ABC. Bayesian Computation (ABC) An adaptve SMC scheme for Approxmate Bayesan Computaton (ABC) (ont work wth Prof. Mke West) Department of Statstcal Scence - Duke Unversty Aprl/2011 Approxmate Bayesan Computaton (ABC) Problems n whch

More information

International Journal of Mathematical Archive-3(3), 2012, Page: Available online through ISSN

International Journal of Mathematical Archive-3(3), 2012, Page: Available online through   ISSN Internatonal Journal of Mathematcal Archve-3(3), 2012, Page: 1136-1140 Avalable onlne through www.ma.nfo ISSN 2229 5046 ARITHMETIC OPERATIONS OF FOCAL ELEMENTS AND THEIR CORRESPONDING BASIC PROBABILITY

More information

Strongly Unforgeable Signatures Based on Computational Diffie-Hellman

Strongly Unforgeable Signatures Based on Computational Diffie-Hellman Strongly Unforgeable Signatures Based on Computational Diffie-Hellman Dan Boneh 1, Emily Shen 1, and Brent Waters 2 1 Computer Science Department, Stanford University, Stanford, CA {dabo,emily}@cs.stanford.edu

More information

Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units

Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units 54 The Internatonal Arab Journal of Informaton Technology, Vol., o. 5, September 204 Hardenng the ElGamal Cryptosystem n the Settng of the Second Group of Unts Ramz Haraty, Abdulasser ElKassar, and Suzan

More information

Efficient Ring Signatures Without Random Oracles

Efficient Ring Signatures Without Random Oracles Effcent Rng Sgnatures Wthout Random Oracles Hovav Shacham hovav.shacham@wezmann.ac.l Brent Waters bwaters@csl.sr.com Abstract We descrbe the frst effcent rng sgnature scheme secure, wthout random oracles,

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack

A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack Huafei Zhu InfoComm Security Department, Institute for InfoComm Research. 21 Heng Mui Keng

More information

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,

More information

A new Approach for Solving Linear Ordinary Differential Equations

A new Approach for Solving Linear Ordinary Differential Equations , ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of

More information

Logarithm Cartesian authentication codes

Logarithm Cartesian authentication codes Informaton and Computaton 184 23 93 18 www.elsever.com/locate/c Logarthm Cartesan authentcaton codes T.W. Sze, a S. Chanson, a C. Dng, a T. Helleseth, b and M.G. Parker b, a Department of Computer Scence,

More information

Threshold Undeniable RSA Signature Scheme

Threshold Undeniable RSA Signature Scheme Threshold Undeniable RSA Signature Scheme Guilin Wang 1, Sihan Qing 1, Mingsheng Wang 1, and Zhanfei Zhou 2 1 Engineering Research Center for Information Security Technology; State Key Laboratory of Information

More information

Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations

Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations Sequental Aggregate Sgnatures wth Lazy Verfcaton from Trapdoor Permutatons Kyle Brogle Sharon Goldberg Leond Reyzn June 9, 2014 Abstract Sequental aggregate sgnature schemes allow n sgners, n order, to

More information

Polynomial Arithmetic

Polynomial Arithmetic Polynomal Arthmetc Stefan Jerg jerg@n.tum.de Zentrum Mathematk Technsche Unverstät München (TUM) 1 Overvew Polynomal Arthmetc Polynomal Arthmetc Generaltes Polynomal Addton Polynomal Multplcaton Fast Polynomal

More information

A Novel Fuzzy logic Based Impulse Noise Filtering Technique

A Novel Fuzzy logic Based Impulse Noise Filtering Technique Internatonal Journal of Advanced Scence and Technology A Novel Fuzzy logc Based Impulse Nose Flterng Technque Aborsade, D.O Department of Electroncs Engneerng, Ladoke Akntola Unversty of Tech., Ogbomoso.

More information

A Novel, Low-Power Array Multiplier Architecture

A Novel, Low-Power Array Multiplier Architecture A Noel, Low-Power Array Multpler Archtecture by Ronak Bajaj, Saransh Chhabra, Sreehar Veeramachanen, MB Srnas n 9th Internatonal Symposum on Communcaton and Informaton Technology 29 (ISCIT 29) Songdo -

More information

Sequential Aggregate Signatures and Multisignatures Without Random Oracles

Sequential Aggregate Signatures and Multisignatures Without Random Oracles Sequental Aggregate Sgnatures and Multsgnatures Wthout Random Oracles Steve Lu stevelu@math.ucla.edu Hovav Shacham hovav.shacham@wezmann.ac.l Rafal Ostrovsky rafal@cs.ucla.edu May 16, 2006 Amt Saha saha@cs.ucla.edu

More information

Sketching Sampled Data Streams

Sketching Sampled Data Streams Sketchng Sampled Data Streams Florn Rusu and Aln Dobra CISE Department Unversty of Florda March 31, 2009 Motvaton & Goal Motvaton Multcore processors How to use all the processng power? Parallel algorthms

More information

Parameter Estimation for Dynamic System using Unscented Kalman filter

Parameter Estimation for Dynamic System using Unscented Kalman filter Parameter Estmaton for Dynamc System usng Unscented Kalman flter Jhoon Seung 1,a, Amr Atya F. 2,b, Alexander G.Parlos 3,c, and Klto Chong 1,4,d* 1 Dvson of Electroncs Engneerng, Chonbuk Natonal Unversty,

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Wavelet chaotic neural networks and their application to continuous function optimization

Wavelet chaotic neural networks and their application to continuous function optimization Vol., No.3, 04-09 (009) do:0.436/ns.009.307 Natural Scence Wavelet chaotc neural networks and ther applcaton to contnuous functon optmzaton Ja-Ha Zhang, Yao-Qun Xu College of Electrcal and Automatc Engneerng,

More information

CSE4210 Architecture and Hardware for DSP

CSE4210 Architecture and Hardware for DSP 4210 Archtecture and Hardware for DSP Lecture 1 Introducton & Number systems Admnstratve Stuff 4210 Archtecture and Hardware for DSP Text: VLSI Dgtal Sgnal Processng Systems: Desgn and Implementaton. K.

More information

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1 A New Metrc for Qualty Assessment of Dgtal Images Based on Weghted-Mean Square Error Proceedngs of SPIE, vol. 4875, 2002 Kawen Zhang, Shuozhong Wang, and Xnpen Zhang School of Communcaton and Informaton

More information

Semi-supervised Classification with Active Query Selection

Semi-supervised Classification with Active Query Selection Sem-supervsed Classfcaton wth Actve Query Selecton Jao Wang and Swe Luo School of Computer and Informaton Technology, Beng Jaotong Unversty, Beng 00044, Chna Wangjao088@63.com Abstract. Labeled samples

More information

Cryptography System for Information Security Using Chaos Arnold's Cat Map Function

Cryptography System for Information Security Using Chaos Arnold's Cat Map Function 4 th ICRIEMS Proceedngs Publshed by The Faculty Of Mathematcs And Natural Scences Yogyakarta State Unversty, ISBN 978-602-74529-2-3 Cryptography System for Informaton Securty Usng Chaos Arnold's Cat Map

More information

Mining Data Streams-Estimating Frequency Moment

Mining Data Streams-Estimating Frequency Moment Mnng Data Streams-Estmatng Frequency Moment Barna Saha October 26, 2017 Frequency Moment Computng moments nvolves dstrbuton of frequences of dfferent elements n the stream. Frequency Moment Computng moments

More information

Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring

Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring Dario Catalano 1 and Rosario Gennaro 2 1 CNRS - École normale supérieure, Laboratoire d informatique 45 rue d Ulm,

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

Cryptography based on number fields with large regulator

Cryptography based on number fields with large regulator Journal de Théore des Nombres de Bordeaux 12 (2000), 293 307 Cryptography based on number felds wth large regulator par Johannes BUCHMANN, Markus MAURER et Bodo MÖLLER Résumé. Nous ntrodusons une varante

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

5199/IOC5063 Theory of Cryptology, 2014 Fall

5199/IOC5063 Theory of Cryptology, 2014 Fall 5199/IOC5063 Theory of Cryptology, 2014 Fall Homework 2 Reference Solution 1. This is about the RSA common modulus problem. Consider that two users A and B use the same modulus n = 146171 for the RSA encryption.

More information

Research on State Collisions of Authenticated Cipher ACORN

Research on State Collisions of Authenticated Cipher ACORN 4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Research on State Collsons of Authentcated Cpher ACORN Pe Zhanga*, Je Guanb, Junzh Lc and Tarong Shd Informaton

More information

Post-quantum Key Exchange Protocol Using High Dimensional Matrix

Post-quantum Key Exchange Protocol Using High Dimensional Matrix Post-quantum Key Exchange Protocol Usng Hgh Dmensonal Matrx Rchard Megrelshvl I. J. Tbls State Unversty rchard.megrelshvl@tsu.ge Melksadeg Jnkhadze Akak Tseretel State Unversty Kutas, Georga mn@yahoo.com

More information

Sequential Aggregate Signatures and Multisignatures Without Random Oracles

Sequential Aggregate Signatures and Multisignatures Without Random Oracles Sequental Aggregate Sgnatures and Multsgnatures Wthout Random Oracles Steve Lu 1,, Rafal Ostrovsky 2,, Amt Saha 3,, Hovav Shacham 4, and Brent Waters 5, 1 UCLA stevelu@math.ucla.edu 2 UCLA rafal@cs.ucla.edu

More information

A Composition Theorem for Universal One-Way Hash Functions

A Composition Theorem for Universal One-Way Hash Functions A Composition Theorem for Universal One-Way Hash Functions Victor Shoup IBM Zurich Research Lab, Säumerstr. 4, 8803 Rüschlikon, Switzerland sho@zurich.ibm.com Abstract. In this paper we present a new scheme

More information

From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited

From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited Julien Cathalo 1, Jean-Sébastien Coron 2, and David Naccache 2,3 1 UCL Crypto Group Place du Levant 3, Louvain-la-Neuve, B-1348, Belgium

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Discretization of Continuous Attributes in Rough Set Theory and Its Application*

Discretization of Continuous Attributes in Rough Set Theory and Its Application* Dscretzaton of Contnuous Attrbutes n Rough Set Theory and Its Applcaton* Gexang Zhang 1,2, Lazhao Hu 1, and Wedong Jn 2 1 Natonal EW Laboratory, Chengdu 610036 Schuan, Chna dylan7237@sna.com 2 School of

More information

Security Proofs for Signature Schemes. Ecole Normale Superieure. 45, rue d'ulm Paris Cedex 05

Security Proofs for Signature Schemes. Ecole Normale Superieure. 45, rue d'ulm Paris Cedex 05 Security Proofs for Signature Schemes David Pointcheval David.Pointcheval@ens.fr Jacques Stern Jacques.Stern@ens.fr Ecole Normale Superieure Laboratoire d'informatique 45, rue d'ulm 75230 Paris Cedex 05

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

Constructing Verifiable Random Number in Finite Field

Constructing Verifiable Random Number in Finite Field Jun Ye 1, Xiaofeng Chen 2, and Jianfeng Ma 2 1 School of Science, Sichuan University of Science and Engineering Zigong, Sichuan, China yejun@suseeducn 2 School of Telecommunication Engineering, Xidian

More information

MULTIDIMENSIONAL LINEAR DISTINGUISHING ATTACKS AND BOOLEAN FUNCTIONS

MULTIDIMENSIONAL LINEAR DISTINGUISHING ATTACKS AND BOOLEAN FUNCTIONS Boolean Functons: Cryptography and Applcatons Fonctons Booléennes : Cryptographe & Applcatons BFCA 08 MULTIDIMENSIONAL LINEAR DISTINGUISHING ATTACKS AND BOOLEAN FUNCTIONS Ma Hermeln 1 and Kasa Nyberg 1

More information

PRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM

PRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM PRIME NUMBER GENERATION BASED ON POCKLINGTON S THEOREM Alexandros Papankolaou and Song Y. Yan Department of Computer Scence, Aston Unversty, Brmngham B4 7ET, UK 24 October 2000, Receved 26 June 2001 Abstract

More information

[ ] T Journal of Software. Vol.13, No /2002/13(05)

[ ] T Journal of Software. Vol.13, No /2002/13(05) -985//(5)957-9 Journal of Software Vol, No5, (, 8) E-al: xqeng@csuclaedu; huz@nlpraaccn http://wwwaaccn/nlpr/ : ( ),,,,,,, : ; ; : P9 : A [,],,,Zhang [] ( ), ( ),, (hoograph), Zhang, (DVS) Zhang,,,, (

More information

Secure and practical identity-based encryption

Secure and practical identity-based encryption Secure and practcal dentty-based encrypton D. Naccache Abstract: A varant of Waters dentty-based encrypton scheme wth a much smaller system parameters sze (only a few klobytes) s presented. It s shown

More information

Cryptographic Protocols

Cryptographic Protocols Cryptographc Protocols Entty Authentcaton Key Agreement Fat-Shamr Identfcaton Schemes Zero-Knowledge Proof Systems Shnorr s Identfcaton/Sgnature Scheme Commtment Schemes Secret Sharng Electronc Electon

More information

A New Evolutionary Computation Based Approach for Learning Bayesian Network

A New Evolutionary Computation Based Approach for Learning Bayesian Network Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang

More information

Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring

Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn 33102 Paderborn,

More information

How (Not) to Design Strong-RSA Signatures

How (Not) to Design Strong-RSA Signatures Published in Designs, Codes and Cryptography, 59(1/3):169 182, 2011. How (Not) to Design Strong-RSA Signatures Marc Joye Abstract This paper considers strong-rsa signature schemes built from the scheme

More information

A Pseudo-Random Encryption Mode

A Pseudo-Random Encryption Mode A Pseudo-Random Encryption Mode Moni Naor Omer Reingold Block ciphers are length-preserving private-key encryption schemes. I.e., the private key of a block-cipher determines a permutation on strings of

More information

Short Term Load Forecasting using an Artificial Neural Network

Short Term Load Forecasting using an Artificial Neural Network Short Term Load Forecastng usng an Artfcal Neural Network D. Kown 1, M. Km 1, C. Hong 1,, S. Cho 2 1 Department of Computer Scence, Sangmyung Unversty, Seoul, Korea 2 Department of Energy Grd, Sangmyung

More information

On the Instantiability of Hash-and-Sign RSA Signatures

On the Instantiability of Hash-and-Sign RSA Signatures On the Instantablty of Hash-and-Sgn RSA Sgnatures Yevgeny Dods Iftach Hatner Ars Tentes December 29, 2011 Abstract The hash-and-sgn RSA sgnature s one of the most elegant and well known sgnatures schemes,

More information

Aerosols, Dust and High Spectral Resolution Remote Sensing

Aerosols, Dust and High Spectral Resolution Remote Sensing Aerosols, Dust and Hgh Spectral Resoluton Remote Sensng Irna N. Sokolk Program n Atmospherc and Oceanc Scences (PAOS) Unversty of Colorado at Boulder rna.sokolk@colorado.edu Goals and challenges MAIN GOALS:

More information