Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Youn, Taek-Young | - |
dc.contributor.author | Park, Young-Ho | - |
dc.contributor.author | Lim, Jongin | - |
dc.date.accessioned | 2021-09-08T11:24:00Z | - |
dc.date.available | 2021-09-08T11:24:00Z | - |
dc.date.created | 2021-06-11 | - |
dc.date.issued | 2009-12 | - |
dc.identifier.issn | 0916-8532 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/118879 | - |
dc.description.abstract | Trapdoor commitment schemes are widely used for adding valuable properties to ordinary signatures or enhancing the security of weakly secure signatures. In this letter. we propose a trapdoor commitment scheme based on RSA function, and prove its security under the hardness of the integer factoring. Our scheme is very efficient in computing a commitment. Especially. it requires only three multiplications for evaluating a commitment when e = 3 is used as a public exponent of RSA function. Moreover, our scheme has two useful properties, key exposure freeness and strong trapdoor opening. which are useful for designing secure chameleon signature schemes and converting a weakly secure signature to a strongly secure signature, respectively. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.subject | KEY EXPOSURE | - |
dc.subject | SIGNATURES | - |
dc.subject | SCHEMES | - |
dc.title | Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lim, Jongin | - |
dc.identifier.doi | 10.1587/transinf.E92.D.2520 | - |
dc.identifier.scopusid | 2-s2.0-77950257265 | - |
dc.identifier.wosid | 000273190800029 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E92D, no.12, pp.2520 - 2523 | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.citation.title | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.citation.volume | E92D | - |
dc.citation.number | 12 | - |
dc.citation.startPage | 2520 | - |
dc.citation.endPage | 2523 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | KEY EXPOSURE | - |
dc.subject.keywordPlus | SIGNATURES | - |
dc.subject.keywordPlus | SCHEMES | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | trapdoor commitment | - |
dc.subject.keywordAuthor | key exposure freeness | - |
dc.subject.keywordAuthor | strong trapdoor opening | - |
dc.subject.keywordAuthor | integer factoring problem | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.