An analysis of proxy signatures: is a secure channel necessary?

  • Authors:
  • Jung-Yeun Lee;Jung Hee Cheon;Seungjoo Kim

  • Affiliations:
  • International Research Center for Information Security, Information and Communications Univ., Korea;International Research Center for Information Security, Information and Communications Univ., Korea;Korea Information Security Agency, Korea

  • Venue:
  • CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Montgomery Prime Hashing (MPH) is a scheme for message authentication based on universal hashing.I n MPH, roughly speaking, the hash value is computed as the Montgomery residue of the message with respect to a secret modulus.The modulus value is structured in a way that allows fast, compact implementations in both hardware and software.The set of allowed modulus values is large, and as a result, MPH achieves good, provable security. MPH performance is comparable to that of other high-speed schemes such as MMH. An advantage of MPH is that the secret key (i.e., the modulus) is small, typically 128-256 bits, while in MMH the secret key is typically much larger.I n applications where MMH key length is problematic, MPH may be an attractive alternative.