Journal
IET INFORMATION SECURITY
Volume 10, Issue 1, Pages 33-36Publisher
INST ENGINEERING TECHNOLOGY-IET
DOI: 10.1049/iet-ifs.2014.0547
Keywords
computational complexity; mobile computing; digital signatures; prime number generation; ring signature key generation; l; 2-bit primes; prime integer; Naive algorithm; l; 2-integer; l-bit operations; computational complexity; mobile devices; space constraints
Funding
- University of Zaragoza [UZ2014-TEC-02]
- CeNITEQ (Communication Networks and Information Technologies for e-Health and Quality of Experience Group, University of Zaragoza)
Ask authors/readers for more resources
The authors describe two different algorithms to perform efficiently the ring signature keys generation. Given an integer size, l, their algorithms find efficiently (memory and time, respectively) two distinct l/2-bit primes (e(1), e(2)) such that e = 2e(1)e(2) + 1 will be a prime integer. With a naive algorithm one only needs to store O(l) bits (more specifically, only one l/2-integer), and need, in average, O(l(4)) basic l-bit operations. With the second algorithm, one not only improves this computational complexity O(l(7/2)), but also needs to use, in average, O(l(3/2)) bits. The authors consider these algorithms useful for implementing ring signatures in mobile devices where there exist strong time and space constraints.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available