CONSTRUCTING NEW COLLECTIVE SIGNATURE SCHEMES BASE ON TWO HARD PROBLEMS FACTORING AND DISCRETE LOGARITHM
Tuan Nguyen Kim1, Nguyen Tran Truong Thien1,
Duy Ho Ngoc2 and Nikolay A. Moldovyan3
1School of Computer Science – Duy Tan University, Da Nang, Vietnam
2Department of Information Technology, Ha Noi, Vietnam
3SPIIRAS, St. Petersburg, Russia
ABSTRACT
In network security, digital signatures are considered a basic component to developing digital authentication systems. These systems secure Internet transactions such as e-commerce, e-government, ebanking, and so on. Many digital signature schemes have been researched and published for this purpose. In this paper, we propose two new types of collective signature schemes, namely i) the collective signature for several signing groups and ii) the collective signature for several individual signings and several signing groups. And then we used two difficult problems factoring and discrete logarithm to construct these schemes. To create a combination of these two difficult problems we use the prime module p with a special structure: p = 2n +1. Schnorr’s digital signature scheme is used to construct related basic schemes such as the single signature scheme, the collective signature scheme, and the group signature scheme. The proposed collective signature schemes are built from these basic schemes. The proposed signature scheme is easy to deploy on existing PKI systems. It can support PKIs in generating and providing a unique public key, a unique digital signature, and a unique digital certificate for a collective of many members. This is essential for many collective transactions on today’s Internet.
KEYWORDS
Network security, digital signature authentication, collective signature, group signature, signing group.
1.INTRODUCTION
To ensure the security of transactions on the Internet, people often use authentication systems based on digital signatures. A digital signature not only supports “authentication” of the origin of information but also helps to check the “integrity” of information when it is transmitted from source to destination and prevent the “non-repudiation” of a communication partner.
Most of the existing authentication systems are built on the basis of single digital signature schemes, so it can only support the validation of an individual signer, it is difficult to validate for a collective of many signers. In this paper, we propose and build a signature scheme that can support authentication for a group of signers, with different functions, with only a single public key and signature. This new authentication request is described below.
Assume that there is a collective made up of several groups, each of which has a large number of members and is managed by a group leader. There are another few individual members in this collective that do not belong to any groups, but they are functionally equivalent to the group leaders. The problem is how to create a single digital signature [1-2] that represents this collective. The requirement of digital signature-based authentication [3-4] for a multi-functional collective is quite common in today’s cyberspace. Both group signature protocols [5-9] and collective signature [10] ones can be used to produce a unique signature for a group of multiple signers, but they cannot be used to generate a common signature for a multi-level signing collective as described above. The reason for this is that the group signature scheme [11] can only create a common signature for each group, and the collective signature scheme [12] can only generate a common signature for the group leaders and individual members, or for all collective members [12]. Therefore, we propose a new type of multi-signature scheme, the representative collective signature scheme, which is structured from the combination of the group signature scheme and the collective signature scheme.
Two stages are required to create the representative collective signature. Firstly, the group signature protocol is used to establish group signatures for each group of the collective. The collective signature protocol is then used to generate collective signatures from each group and every other individual. The final signature represents a signing collective made up of several signing groups and individual signers, and it comprises the information of everyone who participated in the formation of this signature.
Most of the digital signature schemes can be built based on a difficult problem or at the same time two difficult problems [13-15]. In this article, we utilize Schnorr’s digital signature standard [16] to develop two types of representative collective signature schemes using two tough challenges simultaneously. For the discrete logarithm problem [17-18], we use a specially structured prime modulo, ๐ = 2๐ + 1, where ๐ = ๐โฒ๐; ๐โฒ and ๐ are two large primes of magnitude 512 bits, or 1024 bits, used as the signer’s private key. When attempting to find ๐โฒ and ๐ from ๐, the factorization problem [19-20] is applied.
2.THE RELATED BASE DIGITAL SIGNATURE SCHEMES
The Schnorr digital signature protocol is built on the difficult problem of the discrete logarithm in prime fields, with the input parameter set selected according to the DSA digital signature standard, but without constraints on size and structure of ๐ and ๐. We propose a modification from the Schnorr scheme by i) Choosing prime modulus with special structure, ๐ = 2๐ + 1, where ๐ = ๐’๐; ๐’ and ๐ are large prime numbers having the 512 bit size or more (the primes ๐’ and ๐ are such that the value 3 does not divide ๐’ โ 1 nor ๐ โ 1); ii) Change the expression for calculating the value S in the the signature generation procedure and iii) Change the expression ๐ โ in the signature checking procedure (๐ is replaced by the parameter ๐๔ฌถ). A new prime modulus has been used for constructing the randomized signature security of which is based on the factorization of the value ๐ = (๐ โ 1)/2.
2.1. The Single Signature Scheme (The SDS-2.1 scheme)
In this scheme we select the parameter ๐ผ having the order ๐ ๐๐๐๐ข๐๐ ๐. The primes ๐’ and ๐ are
elements of the private key.
We assume that the signer has a secret key ๐ฅ (1 < ๐ฅ < ๐ โ 1), ๐ฅ is chosen at random. The
private key of the signer is ๐ฅ. His/Her corresponding public key ๐ฆ: ๐ฆ = ax mod p.
Let ๐นH be a one-way hash function such as SHA-1 or SHA- 2, which produces the hash value ๐ป
from the document ๐: ๐ป = ๐นH(๐).
The signature scheme based on factoring and discrete logarithm problems is described as below:
It includes the following steps:

where d is a large prime, |d| = 160 bits; and ๐ป is a hash value of the document ๐. The value ๐ธ is the first part of the signature.
3.The signer computes the value ๐:
๐ = (๐ + ๐ฅ๐ธ)1/2๐๐๐ ๐
such that:
๐ =๐ผs2 ๐ฆ -E ๐๐๐ ๐
The pair of value (๐ธ, ๐) is the signerโs signature on the document M.
It includes the following steps:
1.The verifier computes the value ๐ โ:
2.The verifier computes the value ๐ธโ:
๐ธโ = ๐ โ๐ป ๐๐๐ d,
3.The verifier compares values ๐ธโ with ๐ธ. If ๐ธโ = ๐ธ: The signature is valid; Otherwise the signature is invalid. It is rejected
To prove the correctness of this signatue scheme we only need to prove the existence of the equation ๐ธโ= ๐ธ.
It is easy to see ๐ โ = ๐ . Indeed:
Since ๐ โ = ๐ so ๐ธโ = ๐ธ (๐ธโ = ๐ โ๐ป ๐๐๐ d = ๐ ๐ป ๐๐๐ d = ๐ธ) is always exists. The correctness of the SDS.2-1 scheme has been proved.
The collective signature scheme described below (the CDS-2.2 scheme) is built on the basis of this signature scheme (the SDS-2.1 scheme).
We assume that there are ๐ signers in the signing collective, 1 โค ๐ โค ๐, to sign the same document ๐. Each signer randomly selects an integer ๐ฅi from the interval [1, ๐ โ 1] and computes a corresponding public key: ๐ฆi = ๐ผxi ๐๐๐ ๐ (๐ฅi is the secret key of the i-th user). The collective signature scheme based on factoring and discrete logarithm problems (CDS-2.2) is described as below:
It includes the following steps:
๐ i = ๐ผki ๐๐๐ ๐
2.The signer sends Ri to all other signers in the signing collective One of the signers in the signing collective, or a element in the PKI system, calculates the common randomization value ๐ :
Anh calculates the first part of the collective signature:
๐ธ = ๐ ๐ป ๐๐๐ d
where d is a large prime, |d| = 160 bits; and ๐ป is a hash value of the document ๐.
The value ๐ธ is sent to all signers in the signing collective.
3.Each signer computes itโs a shared signature ๐i:
๐i = (๐i + ๐ฅi๐ธ)1/2๐๐๐ ๐
4.One of the signers in the signing collective, or a element in the PKI system, calculates the second element of the collective digtal signature ๐:
The pair of value (๐ธ, ๐) is the collective digital signature of the signing collective, there are ๐ signers, on the message M.
It includes the following steps (the verifier can be a element in the PKI system):
4.The verifier compares values ๐ธโ and ๐ธ. If ๐ธโ = ๐ธ: The signature is valid; Otherwise the signature is invalid. It is rejected.
To prove the correctness of this signatue scheme we only need to prove the existence of the equation
๐ธโ = ๐ธ.
It is easy to see ๐ โ = ๐ . Indeed:

Since ๐ โ = ๐ so ๐ธโ = ๐ธ (๐ธโ = ๐ โ๐ป ๐๐๐ d = ๐ ๐ป ๐๐๐ d = ๐ธ) is always exists.
The correctness of the signature scheme has been proved.
It is easy to see that, in this scheme, none of the signers generates his/her individual signature. The signer generates only its shared signature in the collective signature that corresponds exactly to the given document M and to the assigned set of m users. Besides, it is computationally difficult to manipulate with shares ๐1, ๐2, โฆ , ๐m, and compose another collective digital signature, relating to some different set of users.
In this part, we first construct a group signature scheme for a signing group of ๐ members using the group signature protocol provided in [8]. Then, we utilize this scheme and the collective signature scheme mentioned in section 2.2, as the basic schemes, to build two types of the representative collective signature scheme: i) the collective signature for several signing groups and ii) the collective signature for several individual signings and several signing groups
Constructing The Group Signature Scheme (GDS-3.1)
Suppose there is a signing group of m signers who want to sign the document M. Each of the signers selects a private key x. His/Her corresponding public key is ๐ฆi = ๐ผxi ๐๐๐ ๐, ๐ = 1, 2, โฆ , ๐. The public key ๐ of the group manager is a public key of the group and is calculated as follows ๐ = ๐ผK ๐๐๐ ๐, where ๐ is the managerโs private key. The group manager, can be a element in the PKI system. The value ๐ is used in the signature verification procedure of the GDS-3.1 scheme. Let ๐นH is some specified hash function.
The group signature scheme based on factoring and discrete logarithm problems (GDS-3.1) is described as follows:
It consists of stages:
1.The group manager does the following tasks:
๐ป = ๐นH(๐)
li = ๐นH(๐ป || ๐ฆi|| ๐นH(๐ป ||๐ฆi|| ๐))
Sends each value ๏ฌi to the corresponding i–th group member

2.Each i-th signer in the signing group does the following tasks:
๐ i = ๐ผki ๐๐๐ ๐
Sends ๐ ito the group manager
3.The group manager does the following tasks:
๐ ‘ = ๐ผK๐๐๐ ๐

and
๐ธ = ๐นH(๐||๐ ||๐) ๐๐๐ d
where d is a large prime, |d| = 160 bit.
E is the second element of the group signature.
4. Each i-th signer in the signing group does the following tasks:
๐i = (๐i + ๐ฅidi๐ธ)1/2๐๐๐ ๐
5.The group manager does the following tasks:
๐ i = ๐ผSi2 ๐ฆโdiE๐๐๐ ๐

The tuple (๐, ๐ธ, ๐) is a group signature of the signing group on the document M.
It includes the following steps (The verifier can be a element in the PKI system):
๐ป = ๐นH(๐)
2.The verifier computes value ๐ โ:
๐ = ๐ผ s(๐๐) ๐๐๐ ๐
3.The verifier computes value ๐ธโ:
๐ธโ = ๐นH(๐||๐ โ||๐) ๐๐๐ d
4.The verifier compares the values ๐ธโ with ๐ธ. If ๐ธโ = ๐ธ: The group signature is valid; Otherwise, the
group signature is invalid. It is rejected.
To prove the correctness of this signatue scheme we only need to prove the existence of the equation
๐ธโ = ๐ธ.
It is easy to see ๐ โ = ๐ . Indeed:

The correctness of the signature scheme has been proved.
3.2. Constructing the Collective Digital Signature For Several Signing Groups
Let ๐ signing groups with public keys ๐j = ๐ผKj ๐๐๐ ๐, where ๐ = 1,2, โฆ , ๐. ๐j is the secret key of the j-th goup manager, have intention to sign the document ๐. Suppose also the j-th signing goup inclues ๐j active individual signers (persons appointed to act on behalf of the j-th signing goup).
The collective signature scheme for several signing group (RCS.01-3.2) is described as below.
It consists of stages:
๐ as the shared element of the j-th group in the first element of the collective signature.
2.Each j-th group manager in the signing collective computes values ๐, ๐ and ๐ธ:
๐ and ๐ธ are the first and second elements of the collective signature.
3.Each j-th group manager does the following tasks:
Where ๐ji in the shared signature of the i-th signer in the j-th group,
4.Each j-th group manager does the following tasks:

The tuple (๐, ๐ธ, ๐) is the collective signature on the document M of the signing collective there are ๐ signing groups.
It includes the following steps (The verifier can be a element in the PKI system):
1.The verifier computes the collective public key shared by all signing groups:
2.The verifier computes the value ๐ โ:
3.The verifier computes the value ๐ธโ:
๐ธโ = ๐นH(๐||๐ โ||๐) ๐๐๐ d
4.The verifier Compares the values ๐ธโ with ๐ธ. If ๐ธโ = ๐ธ: The collective signature is valid. Otherwise, the collective signature is invalid. It is rejected.
To prove the correctness of this signatue scheme we only need to prove the existence of the equation
๐ธโ = ๐ธ.
It is easy to see ๐ โ = ๐ . Indeed:
Since ๐ โ = ๐ so ๐ธโ = ๐ธ (๐ธโ = ๐นH(๐|| ๐ โ|| ๐) = ๐นH(๐|| R|| ๐) = ๐ธ) is always exists.
The correctness of the signature scheme has been proved.
Constructing the Collective Digital Signature Scheme for Several Individual Signers and Several Signing Groups
The collective signature generation procedure of this scheme is similar to that of the RCS.01-3.2 scheme, but for individual signers, ๐๐ is equal to 1.
Suppose ๐ฅj and ๐ฆj = ๐ผxj, where ๐ = ๐ + 1, ๐ + 2, โฆ , ๐ + ๐, are a private key and a public key, correspondingly, of ๐ individual signers participating in the protocol for generating the collective digital signature for g signing groups and m individual signers.
The collective signature scheme for ๐ individual signers ๐ signing groups (RCS.02-3.3) is described as below.
It consists of stages:
๐ as the shared element of the j-th group in the first element of the collective signature.
Computes the randomizing parameter ๐ j:
2.Each j-th individual signer (๐ = ๐ + 1, ๐ + 2, โฆ , ๐ + ๐) does the following tasks:
Generates a random value ๐พj, ๐พj < ๐, and then computes the value ๐ j:
๐ j = ๐ผKj ๐๐๐ ๐
Sent ๐ j to all group managers and other individual signers in the signing collective.
Each j-th group manager and each j-th individual signer in the signing collective computes values ๐, ๐ and ๐ธ:
where ๐ฟ is a large prime having, |ฮด| = 160 bits; ๐ = 0 for ๐ = ๐ + 1, ๐ + 2, โฆ , ๐ + ๐.
๐ and ๐ธ are the first and second elements of the signature.
3. a) Each j-th group manager computes the shared signature of j-th group ๐j:
where ๐ji is the shared signature of the i-th signer in the j-th signing group.
And sends ๐j to all individual signers and other group managers.
b) Each j-th individual signer computes his/her shared signature ๐j:
And sends ๐j to all group managers and other individual signers.
4.Each j-th group manager and each individual signers does the following tasks:
If all shares Sj satisfy the last verification equation, then the third element Sof the collective signature is computed:
The tuple (๐, ๐ธ, ๐) is the collective signature on the document M of the signing collective there are ๐ signing groups and ๐ individual signers.
The first element ๐ of the collective signature contains information about the all group members of each signing group who signed the document ๐.
It includes the following steps (The verifier can be a element in the PKI system):
1.The verifier computes the collective public key shared by all signing groups and individual signers:
2.The verifier computes the value ๐ โ:
3.The verifier computes the value ๐ธโ:
๐ธโ = ๐นH(๐|| ๐ โ|| ๐)
4.The verifier Compares the value ๐ธโ with ๐ธ. If ๐ธโ = ๐ธ: The collective signature is valid; Otherwise, the collective signature is invalid. It is rejected.
To prove the correctness of this signatue scheme we only need to prove the existence of the equation
๐ธโ = ๐ธ.
It is easy to see ๐ โ = ๐ . Indeed:
The correctness of the signature scheme has been proved.
4.SECURITY ANALYSIS AND PERFORMANCE EVALUATION
Security analysis of the proposed collective digital signature schemes
Security level of the single digital signature (SDS-2.1)
It is easy to see that, the solution of the discrete logarithm problem in ๐บ๐น(๐) is not sufficient for breaking this signature scheme. To break the scheme it is required to know the factorization of n. Indeed, the solution of the discrete logarithm problem leads to the computation of the secret key x and the possibility to calculate the value ๐ + ๐ฅ๐ธ ๐๐๐ ๐. However, to calculate the signature element๐ is required to extract the 2-th root modulo n from ๐ + ๐ฅ๐ธ ๐๐๐ ๐. This requires factoring the modulus ๐. This is the second difficult problem.
Security level of the group digital signature scheme (GDS-3.1)
With the group signature scheme, there are two main types of attacks: Internal attacks and external attacks. In external attacks, the attacker only knows the system parameters and the public keys, along with the document M, while in internal attacks, the attacker will know a lot more information.
Letโs take a look at the most likely successful case where the attacker is the group manager, since he has the most information.
Assuming the signing group consists of ๐ members. Since the group manager knows the values ๐m, ๐ m, ๐ฆm so if he wants to attack the m-th person in the signing group he can do the following: He needs to calculate: ๐ฅm = ๐๐๐a ๐ฆm ๐๐๐ ๐; or computes: ๐m = loga ๐ m ๐๐๐ ๐; and then computes: ๐ฅm = ๐2 โ ๐ฅ๐ธ ๐๐๐ ๐. These require solving the discrete logarithm problem.
Assuming the signing group consists of ๐ members. The group manager of this signing group knows the values ๐m, ๐ m, ๐ฆm so if the group manager wants to attack the m-th person in the signing group he perform the following steps:
Choose ๐ โ [1, ๐ โ 1] and calculate his public key:
And calculate the common public value of group.
Choose ๐พ โ [1, ๐ โ 1] and compute:
Compute ๐ and ๐ธ, send ๐ธ to all other member of group.
The tuple (๐, ๐ธ, ๐) still satisfy the test equation ๐ = ๐ผS2 (๐๐)E ๐๐๐ ๐. Because:
When deploying the scheme to prevent this type of attack, it is necessary to have a trusted department to act as the group manager. The PKI plays an important role in this case [21-22].
When building a signing group, that department is responsible for receiving the public key of each signing member, then calculating and publishing the public public key of the signing group, the public keys of the members must also be made public. Publicly announced in the signing group for all members of the group to know. The private-public keys of the members and the public keys of the whole group are fixed, and the attacker will not be able to recompute them as shown in expression (53). So the scheme is safe if implemented correctly (53).
The security level of the collective digital signature and the collective digital signature of signing groups are similar to Security level of digital signature for signing group we mention above.
The performance of a digital signature scheme can be evaluated by calculating the time cost of signature generation and the time cost of signature verification. We do it this way. The time costs of representative collective signature schemes proposed in this paper are shown in Table 1.
Notations: ๐h: Time cost of a hash operation in ๐p; ๐s: Time cost of a scalar multiplication in ๐p;
๐inv: Time cost of a inverse operation in ๐p; ๐e: Time cost of an exponent operation in ๐p; ๐m: Time cost of a modular multiplication in ๐p. According to [23]: ๐h โ ๐m, ๐s โ 29๐m, ๐inv โ 240๐m,
Figure 1. Example of a Petri Net
Figure 1. Example of a Petri Net
Table 1 shows that the time cost for the generation of signature components and for the signature verification of the proposed collective signature schemes are is much higher than that of the similar signature scheme in [24]. This is considered as a limitation that needs to be overcome for schemes built on two difficult problems factoring and discrete logarithm [25-27].
In this paper, we have shown that there is a new authentication requirement that requires collective key generation and signature generation algorithms to satisfy. Our proposed collective signature can meet this new requirement.
In addition, we have succeeded in using simultaneously two difficult problems factoring and discrete logarithm to build two types of representative collective signature schemes, which are: i) the collective signature scheme for many signing groups and ii) the collective signature scheme for many individual signers and many signing groups. These types of schemes are essential for the multi-level authentication requirements of many information exchange applications in today’s network environment and it is also easy to deploy on existing PKI systems.
The simultaneous combination of two difficult problems factoring and discrete logarithm is demonstrated by choosing a prime modulo p with a special structure, ๐ = 2๐ + 1 with
๐ = ๐โฒ๐, ๐‘ and ๐ are large prime numbers having the 512 bit size or 1024 bit. The security level of the proposed collective signature schemes is inherited from the base scheme which has been analyzed in section 4.1. That is, to break the proposed collective signature scheme, the attacker must also solve two difficult problems simultaneously.
The paper also calculated and compared the performance of the two proposed schemes with the performance of some other schemes.
CONFLICT OF INTEREST
The authors declare no conflict of interest.
REFERENCES
[1] Pieprzyk J., Hardjono T. & Seberry J., (2003) โFundamentals of Computer Securityโ, Springer-Verlag, Berlin Heidelberg.
[2] National Institute of Standards & Technology, (2009) โDigital Signature Standardโ, Federal Information Processing Standards Publication 186-3.
[3] Ganeshkumar K. & Arivazhagan D., (2014) โGenerating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Securityโ, Indian Journal of Science and Technology.
[4] Girault M., Poupard G. & Stern J., (2006) โOn the Fly Authentication and Signature Schemes Based on Groups of Unknown Orderโ, In Journal of Cryptology, no.19, pp.463-487.
[5] Seetha R. & Saravanan R., (2016) โDigital Signature Schemes for group communication: A Surveyโ, International Journal of Applied Engineering Research, no.11, pp.4416โ4422.
[6] Enache A. C., (2012) โAbout Group Digital Signaturesโ, Journal of Mobile, Embedded and Distributed Systems, no.4, pp.193โ202.
[7] Alamรฉlou Q., Blazy O., Cauchie S. & Ph. Gaborit, (2017) โA code-based group signature schemeโ, Designs, Codes and Cryptography, vol.82, no.1-2.
[8] Moldovyan A. A. & Moldovyan N. A, (2014) โGroup signature protocol based on masking public keysโ,Quasigroups and related systems, no.22, pp.133โ140. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022
132
[9] Xie R., Xu C., He C. & Zhang X., (2016) โA new group signature scheme for dynamic membershipโ, International Journal of Electronic Security and Digital Forensics, vol.8, no.4.
[10] Moldovyan N. A., Nguyen Hieu Minh, Dao Tuan Hung & Tran Xuan Kien, (2016) โGroup Signature Protocol Based on Collective Signature Protocol and Masking Public Keys Mechanismโ, International Journal of Emerging Technology and Advanced Engineering, no.6, pp.1โ5.
[11] Rajasree R. S., (2014) โGeneration of Dynamic Group Digital Signatureโ, International Journal of Computer Applications, no.98, pp.1โ5.
[12] Moldovyan N. A., (2011) โBlind Collective Signature Protocolโ, Computer Science Journal of Moldova, no.19, pp.80โ91.
[13] Tahat N., Ismail E., and Ahmad R., (2009) โA New Blind Signature Scheme Based on Factoring and Discrete Logarithms,โ International Journal of Cryptology Research, vol.1, no.1, pp.1-9.
[14] Minh N., Binh D., Giang N. & Moldovyan N. A., (2012) โBlind Signature Protocol Based on Difficulty of Simultaneous Solving Two Difficult Problemsโ, Journal of Applied Mathematical Sciences, vol.6, no.139, pp.6903-6910.
[15] Berezin A., Moldovyan N. A. & Victor S., (2013) โCryptoschemes Based on Difficulty of Simultaneous Solving Two Different Difficult Problemsโ, Computer Science Journal of Moldova, vol.21, no.2, pp.280-290.
[16] Schnorr C. P., (1991) โEfcient signature generation by smart-cardsโ, In Journal of Cryptology, vol.4, no.3, pp.161-174.
[17] Camenisch J. L., Piveteau J. -M. & Stadler M. A., (1995) โBlind Signatures Based on the Discrete Logarithm Problemโ, In: Advances in Crypology โ EUROCRYPT’94 Proc, Lecture Notes in Computer Science, Springer-Verlag, Berlin Heidelberg New York, vol.950, pp.428โ432.
[18] Moldovyan N. A. & Moldovyan A. A, (2010) โBlind Collective Signature Protocol Based on Discrete Logarithm Problemโ, Int. Journal of Network Security, no.11, pp.106โ113.
[19] Nimbalkar A. B., (2018) โThe Digital Signature Schemes Based on Two Hard Problems: Factorization and Discrete Logarithmโ, Advances in Intelligent Systems and Computing, Cyber Security. vol.729, pp.493.498.
[20] Moldovyan N. A., (2011) โBlind Signature Protocols from Digital Signature Standardsโ, Int. Journal of Network Security, no.13, pp.22โ30.
[21] Selvakumaraswamy S. & Govindaswamy U., (2016) โEfficient Transmission of PKI Certificates using ECC and its Variantsโ, The International Arab Journal of Information Technology, vol.13, no.1, pp.38-43.
[22] Shivkumar S. and Umamaheswari G., (2015) โEfficient Transmission of PKI Certificates using Elliptic Curve Cryptography and its Variantsโ, The International Arab Journal of Information Technology, pp. 38-43.
[23] 21Popescu C., (1999) โBlind signature and BMS using elliptic curvesโ, Studia univ babesโbolyai, Informatica, pp.43-49.
[24] 22Tuan N. K., Van V.L., Moldovyan D. N., Duy H. N. & Moldovyan A. A., (2018) โCollective signature protocols for signing groupsโ, In Proc. Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, India.
[25] 23Moldovyan N. A., (2008) โDigital Signature Scheme Based on a New Hard Problemโ, Computer Science Journal of Moldova, no.16, pp.163โ18.
[26] 24Lee J., Kim H., Lee Y., Hong S. M. & Yoon H., (2017) โParallelized scalar multiplication on elliptic curves defined over optimal extension fieldโ, International Journal of Network Security, vol.4, p.99-106.
[27] 26Chaum D., (1983) โBlind Signatures for Untraceable Paymentsโ, Advances in Cryptology: Proc. of CRYPTOโ82, Plenum Press, p.199โ203.
AUTHORS
Tuan Nguyen Kim was born in 1969, received B.E., and M.E from Hue University of Sciences in 1994, and from Hanoi University of Technology in 1998. He has been a lecturer at Hue University since 1996. From 2011 to the present (2021) he is a lecturer at Sch ol of Computer Science, Duy Tan U iversity, Da Nang, Vietnam. His main research interestsinclude Computer Network Technology and Information.
Nguyen Tran Truong Thien was born in 1997, received B.E from Duy Tan University in 2020. He has been a security researcher at Duy Tan University since February 2021. Hismain research interests include is Network Security, Information Security and Machine learning for Cybersecurity.
Duy Ho Ngoc was born in 1982. He received his Ph.D. in Cybersecurity in 2007 from LETI University, St. Petersburg, Rus ia Federation. He has authored more than 45 scienti๏ฌc articles in cybersecurity.
Nikolay A. Moldovyan is an honored inventor of Russian Federation (2002), a laboratory head at St. Petersburg Institute for Informatics and Automation of Russian Acade y of Sciences, and a Professor with the St. Petersburg State Electrotechnical University. His research interests include computer security and cryptography. He has authored or co- authored more than 60 inventions and 220 scienti๏ฌc articles, books, and report . He received his Ph.D. from the Academy of Sciences of Moldova (1981).