Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Signature schemes based on the strong RSA assumption
Cramer R., Shoup V. ACM Transactions on Information and System Security3 (3):161-185,2000.Type:Article
Date Reviewed: Mar 1 2001

A new digital signature scheme is described and analyzed. Its security against chosen-message attack is based on the strong Rivest-Shamir-Adelman (RSA) assumption, defined in 1997 by Baric´ and  Pfitzmann  [1]. This scheme is state-free (that is, it does not require that the signer maintain any state). Basically, the ideas are the same as in the scheme of Cramer and Damgaard [2], but different from that of Gennaro et al. [3], which uses the same hypothesis.

A hash function can be incorporated into the scheme in such a way that it remains secure in the random oracle model under the standard RSA assumption. In this sense, the authors prove that their scheme can be made at least as secure as a standard RSA signature.

Some complementary problems are treated. The authors show that the problem of defining the strong RSA assumption is random self-reducible (section 4). A fast prime generation algorithm that generates prime numbers of the form , where is a prime number and is an integer, is proposed. The algorithm is defined for 161-bit prime numbers. An interesting result is that for any there are more than prime numbers of the form in the range . A procedure for generating Sophie Germain prime numbers and some preliminary study of the density of these numbers are presented. Finally, the authors briefly describe the implementation of a version of their signature scheme, using SHA-1 as the underlying hash function, and discuss its performance.

Reviewer:  Adrian Atanasiu Review #: CR124637
1) Barić, N. and Pfitzmann, B. Collision-free accumulators and fail-stop signature schemes without trees. In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT ’97, Berlin, Germany), W. Fumy, Ed. Springer, New York, 1997, 480–494.
2) Cramer, R. and Damgaard, I. New generation of secure and practical RSA-based signatures. In Proceedings of the 16th Annual International Conference on Advances in Cryptology (CRYPTO ’96, Santa Barbara, CA, Aug. 1996), N. Koblitz, Ed. Springer, New York, 1996, 173–185.
3) Gennaro, R.; Halevi, S.; and Rabin, T. Secure hash-and-sign signatures without the random oracle. In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT ’99). Springer, New York, 1999, 123–139.
Bookmark and Share
 
Authentication (K.6.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Cyberpunk
Hafner K., Markoff J., Simon & Schuster, Inc., New York, NY, 1991. Type: Book (9780671778798)
Nov 1 1993
How to sign digital streams
Gennaro R., Rohatgi P. Information and Computation 165(1): 100-116, 2001. Type: Article
Dec 1 2001
Authentication: from passwords to public keys
Smith R., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  549, Type: Book (9780201615999)
Oct 3 2002
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy