Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
http://hdl.handle.net/11701/22460
Полная запись метаданных
Поле DC | Значение | Язык |
---|---|---|
dc.contributor.author | Moldovyan, Nikolay A. | - |
dc.contributor.author | Moldovyan, Alexandr A. | - |
dc.date.accessioned | 2021-01-19T13:57:26Z | - |
dc.date.available | 2021-01-19T13:57:26Z | - |
dc.date.issued | 2020-12 | - |
dc.identifier.citation | Moldovyan N. A.,Moldovyan A. A. Candidate for practical post-quantum signature scheme. Vestnik of Saint Petersburg University. Applied Mathematics. Computer Science. Control Processes, 2020, vol. 16, iss. 4, pp. 455–461. | en_GB |
dc.identifier.other | https://doi.org/10.21638/11701/spbu10.2020.410 | - |
dc.identifier.uri | http://hdl.handle.net/11701/22460 | - |
dc.description.abstract | A new criterion of post-quantum security is used to design a practical signature scheme based on the computational complexity of the hidden discrete logarithm problem. A 4-dimensional finite non-commutative associative algebra is applied as algebraic support of the cryptoscheme. The criterion is formulated as computational intractability of the task of constructing a periodic function containing a period depending on the discrete logarithm value. To meet the criterion, the hidden commutative group possessing the 2-dimensional cyclicity is exploited in the developed signature scheme. The public-key elements are computed depending on two vectors that are generators of two different cyclic groups contained in the hidden group. When computing the public key two types of masking operations are used: i) possessing the property of mutual commutativity with the exponentiation operation and ii) being free of such property. The signature represents two integers and one vector S used as a multiplier in the verification equation. To prevent attacks using the value S as a fitting element the signature verification equation is doubled. | en_GB |
dc.language.iso | en | en_GB |
dc.publisher | St Petersburg State University | en_GB |
dc.relation.ispartofseries | Vestnik of St Petersburg University. Applied Mathematics. Computer Science. Control Processes;Volume 16; Issue 4 | - |
dc.subject | digital signature | en_GB |
dc.subject | post-quantum cryptoscheme | en_GB |
dc.subject | public key | en_GB |
dc.subject | hidden logarithm problem | en_GB |
dc.subject | finite non-commutative algebra | en_GB |
dc.subject | associative algebra | en_GB |
dc.title | Candidate for practical post-quantum signature scheme | en_GB |
dc.type | Article | en_GB |
Располагается в коллекциях: | Issue 4 |
Файлы этого ресурса:
Файл | Описание | Размер | Формат | |
---|---|---|---|---|
455-461.pdf | 243,88 kB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.