Fast digital signature is a variant of digital signature that uses an algorithm with a much smaller (tenfold) number of calculations of modular arithmetic compared to traditional EDS schemes. A fast electronic signature scheme, like a regular one, includes an algorithm for generating key user pairs , a function for calculating a signature, and a function for verifying a signature.
EDS Problems
Since the invention of EDS in 1976, it has been the most promising field of research in public-key cryptosystems . One of the standard mathematical solutions for building cryptographic algorithms is the discrete logarithm problem, on the basis of which many algorithms for obtaining digital signature have been developed. The main drawback of traditional EDS algorithms , such as the El-Gamal and RSA schemes , is their computational complexity. Calculation of exponentials in modular arithmetic requires the largest computational cost in public key cryptosystems . Currently, a large number of works are underway to improve the performance of cryptographic algorithms by reducing the number of exponential calculations. The shortest known EDS scheme is BLS (Boneh - Lynn - Shacham), using elliptic curves , but it is limited to groups in which there is a pairing function . Algorithm developers work both on improving traditional discrete logarithm schemes using parallel exponential computations, and are studying fundamentally different approaches based, for example, on graph theory instead of modular arithmetic .
Some Fast Digital Signature Algorithms
Fast EDS based on the Diffie-Hellman algorithm
Let be - abelian group ,
- its cyclic subgroup with generator
of order
where
Is a large prime . Let be
and
- security settings, moreover
. Let be
,
and
- hash functions . The signature scheme is as follows:
Key generation
User selects a random secret key. and calculates the public key
.
Signature Creation
The input is the secret key. and message
.
Further, the party creating the signature:
1. selects a random number and random bit ;
2. calculates ;
3. calculates ;
4. calculates where ;
5. calculates ;
6. calculates .
Message signature is an .
Signature Verification
To verify the signature message m, the following is done:
one. appears as ;
2. is calculated and ;
3. is calculated ;
4. checks to see if .
If the equality in step 4 is satisfied, the signature is verified.
Fast EDS based on the Fiat-Shamir algorithm
ZN denotes the ring of integers modulo , and - security settings, usually ,
The role of the key authentication center (CAC)
CAC selects:
- random primes and so that ;
- unidirectional hash function ;
- your own private and public keys.
CAC publishes , and public key .
The CAC secret key is used to sign the public keys it creates. To create such signatures, the CAC can use any secure digital signature scheme.
Custom Key Generation.
Each user selects a secret key consisting of random numbers , varies from 1 to such that GCD for all from 1 to . Signature creation can be accelerated by choosing as small integers . The security of such a scheme is based on the assumption that root computation is difficult. Currently unknown about the existence of algorithms that calculate the roots provided that these roots of order {\ displaystyle \ N ^ {2 ^ {- t + 1}}} .
User registration.
CAC checks user compliance, creates a string containing the name, address, etc., and creates a signature for a couple consisting of and user public key .
Create a signature.
Input message secret key and - the module by which calculations are performed.
1. Choose a random number out of range is calculated .
2. Calculated .
3. Calculated .
The signature on the output is a pair .
Signature creation requires no more than modulation operations, and on average for random only required multiplication operations.
Signature Verification.
Input - Signature , message , , .
1. Signature verified for .
2. Calculated .
3. It is verified that .
Signature verification requires an average for random multiplication operations modulo maximum .
Signature Security.
To fake a message signature cryptanalyst must solve the equation for and .
There are currently no algorithms for solving this equation.
Application of fast EDS
Fast digital signature algorithms are most effective in cases where the key acquisition speed and small signature size are of primary importance. Similar requirements occur in mobile, sensor or personal networks (the radius of which is limited to one room) when transmitting multimedia traffic. The use of a digital signature in GSM mobile phones allows users to create a PIN code on their own, rather than receiving it from an operator.
Implementation of accelerated EDS algorithms for devices with limited resources, such as PDAs, built-in smart cards and mobile phones, whose computing power is much inferior to the capabilities of personal computers, will allow you to spend less energy on creating and storing a signature and thereby increase the device’s battery life without recharging .
Literature
- Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions, Changshe Ma , Jian Weng and Dong Zheng , January 22, 2007
- Fasr Signature Generation with a Fiat Shamir-Like Scheme, H.Ong , CPSchnorr
See also
- Diffie-Hellman Algorithm
- Shamir scheme
- Fast cryptosystem with a public key
- Public Key Cryptosystem
- RSA
- El Gamal Scheme
- Digital signature