Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties

Full metadata record
DC Field Value Language
dc.contributor.authorYoun, Taek-Young-
dc.contributor.authorPark, Young-Ho-
dc.contributor.authorLim, Jongin-
dc.date.accessioned2021-09-08T11:24:00Z-
dc.date.available2021-09-08T11:24:00Z-
dc.date.created2021-06-11-
dc.date.issued2009-12-
dc.identifier.issn0916-8532-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/118879-
dc.description.abstractTrapdoor commitment schemes are widely used for adding valuable properties to ordinary signatures or enhancing the security of weakly secure signatures. In this letter. we propose a trapdoor commitment scheme based on RSA function, and prove its security under the hardness of the integer factoring. Our scheme is very efficient in computing a commitment. Especially. it requires only three multiplications for evaluating a commitment when e = 3 is used as a public exponent of RSA function. Moreover, our scheme has two useful properties, key exposure freeness and strong trapdoor opening. which are useful for designing secure chameleon signature schemes and converting a weakly secure signature to a strongly secure signature, respectively.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectKEY EXPOSURE-
dc.subjectSIGNATURES-
dc.subjectSCHEMES-
dc.titleEfficient Trapdoor Commitment as Secure as Factoring with Useful Properties-
dc.typeArticle-
dc.contributor.affiliatedAuthorLim, Jongin-
dc.identifier.doi10.1587/transinf.E92.D.2520-
dc.identifier.scopusid2-s2.0-77950257265-
dc.identifier.wosid000273190800029-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E92D, no.12, pp.2520 - 2523-
dc.relation.isPartOfIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.titleIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.volumeE92D-
dc.citation.number12-
dc.citation.startPage2520-
dc.citation.endPage2523-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusKEY EXPOSURE-
dc.subject.keywordPlusSIGNATURES-
dc.subject.keywordPlusSCHEMES-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthortrapdoor commitment-
dc.subject.keywordAuthorkey exposure freeness-
dc.subject.keywordAuthorstrong trapdoor opening-
dc.subject.keywordAuthorinteger factoring problem-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE