Skip to main content
Log in

The improved QV signature scheme based on conic curves over ℤ n

  • Published:
Science in China Series F: Information Sciences Aims and scope Submit manuscript

Abstract

The classical RSA is vulnerable to low private exponent attacks (LPEA) and has homomorphism. KMOV based on elliptic curve E n (a,b) over ℤ n can resist LPEA but still has homomorphism. QV over E n (a,b) not only can resist LPEA but also has no homomorphism. However, QV over E n (a,b) requires the existence of points whose order is M n = lcm{♯E p (a,b), ♯E q (a,b)}. This requirement is impractical for all general elliptic curves. Besides, the computation over En(a,b) is quite complicated. In this paper, we further study conic curve C n (a,b) over ℤ n and its corresponding properties, and advance several key theorems and corollaries for designing digital signature schemes, and point out that C n (a,b) always has some points whose order is M n = lcm{♯E p (a,b), ♯E q (a,b)}. Thereby we present an improved QV signature over C n (a,b), which inherits the property of non-homomorphism and can resist the Wiener attack. Furthermore, under the same security requirements, the improved QV scheme is easier than that over E n (a,b), with respect plaintext embedding, inverse elements computation, points computation and points’ order calculation. Especially, it is applicable to general conic curves, which is of great significance to the application of QV schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Koyama K, Maurer U, Okamoto T, et al. New public-key schemes based on elliptic curves over the ring ℤn. In: Feigenbaum J, ed. Advances in Cryptology-CRYPTO’91, Lect Notes in Comput Sci. Santa Barbara: Springer-Verlag, 1992, 576:252–266

    Google Scholar 

  2. Qu M H, Vanstone S. On ID-based cryptosystems over ℤn. In: International Symposium on Number Theory of 2000. Chengdu, 2000. 13–26

  3. Zhu W Y, Sun Q. The elliptic curves over ℤn and digital signature scheme (in Chinese). J Elect Inf Tech, 2003, 25: 40–47

    Google Scholar 

  4. Zhu W Y, Sun Q. The elliptic curve over ℤn and key exchange protocal (in Chinese). Acta Eletr Sin, 2005, 33(1): 83–87

    Google Scholar 

  5. Cao Z F. A public key cryptosystem based on a conic over finite fields \( \mathbb{F}_p \) (in Chinese). In:In: Advances in Cryptology Chinacypt’98. Beijing: Publishing House of Electronics Industry, 1998. 45–49

    Google Scholar 

  6. Cao Z F. Conic analog of RSA cryptosystem and some improved RSA cryptosystem (in Chinese). J Nat Sci Heilongjiang Univ, 1999, 4: 15–18

    Article  Google Scholar 

  7. Sun Q, Zhu W Y, Wang B. The conic curves over ℤn and public key cryptosystem protocol (in Chinese). J Sichuan Univ (Nat Sci Ed), 2005, 42(3): 471–478

    MathSciNet  Google Scholar 

  8. Wang B, Zhu W Y, Sun Q. Public key cryptosystem based on the conic curves over ℤn (in Chinese). J Sichuan Univ (Engin Sci Ed), 2005, 37(5): 112–117

    MathSciNet  Google Scholar 

  9. Sun Q, Zhang Q F, Peng G H. An algorithm to compute the multiples of an element in a group and its application to public key cryptosystems (in Chinese). In: Advances in Cryptology Chinacypt’2002. Beijing: Publishing House of Electronics Industry 2002. 117–124

    Google Scholar 

  10. Hastad J. On using RSA with low exponent in a public key network. In: Williams H C, ed. Advances in Cryptology-CRYPTO 85. Lec Notes in Comput Sci. Santa Barbara: Springer-Verlag, 1986, 218: 403–408

    Google Scholar 

  11. Wiener M J. Cryptanalysis of short RSA secret exponents. IEEE Trans Inf Theory, 1990, 36(3): 553–558

    Article  MATH  MathSciNet  Google Scholar 

  12. Boneh D. Twenty years of attacks on RSA cryptosystem. Notices of the AMS, 1999, 46(2): 203–213

    MATH  MathSciNet  Google Scholar 

  13. Sun Q, Pend G H, Zhu W Y. RSA-type cryptosystem based on conic curves over ℤn and resistance to short private exponent attacks (in Chinese). In: Advances in Cryptology Chinacypt’2006. Beijing: Publishing House of Science and Technology of China, 2006

    Google Scholar 

  14. Zhu W Y, Sun Q. Basis of computer cryptography application (in Chinese). Beijing: Publishing House of Science and Technology of China, 2007. 111–130

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Biao Wang.

Additional information

Supported by the National Natural Science Foundation of China (Grant No. 10128103)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, B., Fang, Y., Lin, H. et al. The improved QV signature scheme based on conic curves over ℤ n . Sci. China Ser. F-Inf. Sci. 52, 602–608 (2009). https://doi.org/10.1007/s11432-009-0083-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-009-0083-z

Keywords

Navigation