4.3 Article

Efficient ways of prime number generation for ring signatures

Journal

IET INFORMATION SECURITY
Volume 10, Issue 1, Pages 33-36

Publisher

INST ENGINEERING TECHNOLOGY-IET
DOI: 10.1049/iet-ifs.2014.0547

Keywords

computational complexity; mobile computing; digital signatures; prime number generation; ring signature key generation; l; 2-bit primes; prime integer; Naive algorithm; l; 2-integer; l-bit operations; computational complexity; mobile devices; space constraints

Funding

  1. University of Zaragoza [UZ2014-TEC-02]
  2. CeNITEQ (Communication Networks and Information Technologies for e-Health and Quality of Experience Group, University of Zaragoza)

Ask authors/readers for more resources

The authors describe two different algorithms to perform efficiently the ring signature keys generation. Given an integer size, l, their algorithms find efficiently (memory and time, respectively) two distinct l/2-bit primes (e(1), e(2)) such that e = 2e(1)e(2) + 1 will be a prime integer. With a naive algorithm one only needs to store O(l) bits (more specifically, only one l/2-integer), and need, in average, O(l(4)) basic l-bit operations. With the second algorithm, one not only improves this computational complexity O(l(7/2)), but also needs to use, in average, O(l(3/2)) bits. The authors consider these algorithms useful for implementing ring signatures in mobile devices where there exist strong time and space constraints.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available