How to fix two RSA-based PVSS schemes: exploration and solution

  • Authors:
  • Kun Peng;Matt Henricksen

  • Affiliations:
  • Institute for Infocomm Research, Singapore;Institute for Infocomm Research, Singapore

  • Venue:
  • ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

At ACISP 2011, Peng shows that efficiency of two RSA-based PVSS schemes deteriorates to an intolerable level when practical parameter setting is adopted. In this paper, we show that Peng's newest PVSS scheme cannot solve the problem. A new PVSS scheme is designed in this paper to fix the problem in the two RSA-based PVSS schemes. It demonstrates that secure and practical PVSS can be designed on the base of RSA encryption.