YANG Jun, ZHOU Xian-wei, QIN Bo-ping. On the Selection of Random Numbers in the ElGamal Algorithm[J]. Journal of Electronic Science and Technology, 2006, 4(1): 55-58.
Citation: YANG Jun, ZHOU Xian-wei, QIN Bo-ping. On the Selection of Random Numbers in the ElGamal Algorithm[J]. Journal of Electronic Science and Technology, 2006, 4(1): 55-58.

On the Selection of Random Numbers in the ElGamal Algorithm

Funds: 

Supported by National Natural Science Foundation of China (No. 60272011) and the Special Fund for Cultivating Excellent Scholars of Beijing Municipality (No.20042D0500103)

More Information
  • Author Bio:

    YANG Jun research interests include applied cryptography, multicast security and group key management.

  • Received Date: 2005-10-12
  • Publish Date: 2006-03-24
  • The ElGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are used for the same algorithm. In the aspects of the sufficiency, necessity, security and computational overhead of parameter selection, this paper analyzes these criteria in a comparative manner and points out the insecurities in some textbook cryptographic schemes. Meanwhile, in order to enhance security a novel generalization of the ElGamal signature scheme is made by expanding the range of selecting random numbers at an acceptable cost of additional computation, and its feasibility is demonstrated.
  • Related Articles

    [1]Pin-Zhong Pan, Chung-Lin Huang. Human Action Recognition Based on Dense Trajectories Analysis and Random Forest[J]. Journal of Electronic Science and Technology, 2016, 14(4): 370-376. DOI: 10.11989/JEST.1674-862X.511181
    [2]Rajeev Singh, Teek Parval Sharma. Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs[J]. Journal of Electronic Science and Technology, 2015, 13(2): 144-152. DOI: 10.3969/j.issn.1674-862X.2015.02.011
    [3]Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu, Yuan-Yu Tsai, Chi-Shiang Chan. Efficient Certificateless Aggregate Signature Scheme[J]. Journal of Electronic Science and Technology, 2012, 10(3): 209-214. DOI: 10.3969/j.issn.1674-862X.2012.03.004
    [4]Tao Wu, Li-Tian Liu. Elliptic Curve Point Multiplication by Generalized Mersenne Numbers[J]. Journal of Electronic Science and Technology, 2012, 10(3): 199-208. DOI: 10.3969/j.issn.1674-862X.2012.03.003
    [5]Xin-Yu Du, Yong-Jie Li, Cheng Luo, De-Zhong Yao. Elitist Reconstruction Genetic Algorithm Based on Markov Random Field for Magnetic Resonance Image Segmentation[J]. Journal of Electronic Science and Technology, 2012, 10(1): 83-87. DOI: 10.3969/j.issn.1674-862X.2012.01.015
    [6]Wei-Bin Lee, Chien-Chen Huang, Chia-Chen Lin. A Photo Certificate-A Framework for Generating Visualized Public Key Certificates[J]. Journal of Electronic Science and Technology, 2011, 9(4): 339-344. DOI: 10.3969/j.issn.1674-862X.2011.04.010
    [7]Wei-Zhong Qian, Chong Fu, Hong-Rong Cheng, Qiao Liu, Zhi-Guang Qin. Enhanced Identifying Gene Names from Biomedical Literature with Conditional Random Fields[J]. Journal of Electronic Science and Technology, 2009, 7(3): 227-231.
    [8]Yi Jiang, Hao-Shan Shi. A Cluster-Based Random Key Revocation Protocol for Wireless Sensor Networks[J]. Journal of Electronic Science and Technology, 2008, 6(1): 10-15.
    [9]NING Ning, WU Shuang-yi, WANG Xiang-zhan, YANG Mo-hua. A Novel Power Optimization Method by Minimum Comparator Number Algorithm for Pipeline ADCs[J]. Journal of Electronic Science and Technology, 2007, 5(1): 75-80.
    [10]WANG Hong, PENG Jian-hua, ZHOU Zheng-ou. Design of a New Chaos Circuit and Its Encryption to Digital Information[J]. Journal of Electronic Science and Technology, 2004, 2(4): 25-28.
  • Catalog

      Article Metrics

      Article views (392) PDF downloads (34) Cited by()
      Related
      Proportional views

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return