PROPER KEY GENERATION FOR THE IZOSIGN ALGORITHM

Loránd Szöllösi, Gábor Fehér, Tamás Marosits

2008

Abstract

In the last decade using digital signatures in authentication and authorization protocols just as in e-business scenarios became more and more important and indispensable. New algorithms with different features for various applications are presented continuously. The IzoSign digital signature creation algorithm was intro- duced by the authors of this paper at CANS 2007. At that time, random key generation was proposed, which was later found vulnerable with high probability to a vertex matching attack (Kutylowski, 2007). We hereby analyze and generalize this kind of attacks, build a key generation algorithm that withstands such attacks, and then give a (theoretic) construction for key generation which (under the P ≠ NP or NP = E X P assumptions) is hard to break.

Download


Paper Citation


in Harvard Style

Szöllösi L., Fehér G. and Marosits T. (2008). PROPER KEY GENERATION FOR THE IZOSIGN ALGORITHM . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 368-372. DOI: 10.5220/0001924403680372

in Bibtex Style

@conference{secrypt08,
author={Loránd Szöllösi and Gábor Fehér and Tamás Marosits},
title={PROPER KEY GENERATION FOR THE IZOSIGN ALGORITHM},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={368-372},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001924403680372},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - PROPER KEY GENERATION FOR THE IZOSIGN ALGORITHM
SN - 978-989-8111-59-3
AU - Szöllösi L.
AU - Fehér G.
AU - Marosits T.
PY - 2008
SP - 368
EP - 372
DO - 10.5220/0001924403680372