CHEN Yun, CHEN Xin. Batch Private Keys Generation for RSA in Security Communication Systems[J]. Journal of Electronic Science and Technology, 2005, 3(1): 22-26.
Citation: CHEN Yun, CHEN Xin. Batch Private Keys Generation for RSA in Security Communication Systems[J]. Journal of Electronic Science and Technology, 2005, 3(1): 22-26.

Batch Private Keys Generation for RSA in Security Communication Systems

Funds: 

Supported by National Laboratory for Modern Communications Foundation (No. 5143 6010404DZ0235)

More Information
  • Author Bio:

    CHEN Yun interesting areas include cryptography and information security.

  • Received Date: 2004-09-08
  • Publish Date: 2005-03-24
  • RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.
  • Related Articles

    [1]Ying-Jin Lu, Jun He. Dempster-Shafer Evidence Theory and Study of Some Key Problems[J]. Journal of Electronic Science and Technology, 2017, 15(1): 106-112. DOI: 10.11989/JEST.1674-862X.5030211
    [2]Kishor V. Bhadane, M. S. Ballal, R. M. Moharil. Enhancement of Distributed Generation by Using Custom Power Device[J]. Journal of Electronic Science and Technology, 2015, 13(3): 246-254. DOI: 10.11989/JEST.1674-862X.505262
    [3]Guo-Bin Zhu, Hu Xiong, Zhi-Guang Qin. Pairing-Free ID-Based Key-Insulated Signature Scheme[J]. Journal of Electronic Science and Technology, 2015, 13(1): 33-38. DOI: 10.3969/j.issn.1674-862X.2015.01.007
    [4]Yu-Fan Ho, Yi-Lun Chi, Iuon-Chang Lin. Analysis of Key Attributes Influencing the User Satisfaction towards Applications[J]. Journal of Electronic Science and Technology, 2013, 11(2): 216-220. DOI: 10.3969/j.issn.1674-862X.2013.02.016
    [5]Xing-Peng Li, Wen-Lu Fu, Qing-Jun Shi, Jian-Bing Xu, Quan-Yuan Jiang. A Fuzzy Logical MPPT Control Strategy for PMSG Wind Generation Systems[J]. Journal of Electronic Science and Technology, 2013, 11(1): 72-77. DOI: 10.3969/j.issn.1674-862X.2013.01.013
    [6]Ya-Fen Chang, Pei-Yu Chang. An Improved User Authentication and Key Agreement Scheme Providing User Anonymity[J]. Journal of Electronic Science and Technology, 2011, 9(4): 352-358. DOI: 10.3969/j.issn.1674-862X.2011.04.012
    [7]Wei-Bin Lee, Chien-Chen Huang, Chia-Chen Lin. A Photo Certificate-A Framework for Generating Visualized Public Key Certificates[J]. Journal of Electronic Science and Technology, 2011, 9(4): 339-344. DOI: 10.3969/j.issn.1674-862X.2011.04.010
    [8]Yi Jiang, Hao-Shan Shi. A Cluster-Based Random Key Revocation Protocol for Wireless Sensor Networks[J]. Journal of Electronic Science and Technology, 2008, 6(1): 10-15.
    [9]JIN Jian-xun, GUO Yuan-chang, ZHANG Gang, WANG Hou-jun, XU Hong-bing, TIAN Shu-lin, TONG Ling. Summary of the First Generation High Temperature Superconducting Wire: Processing, Characterization and Applications[J]. Journal of Electronic Science and Technology, 2006, 4(1): 63-70.
    [10]LIU Xin, XIONG You-lun. Enhancing SAT-Based Test Pattern Generation[J]. Journal of Electronic Science and Technology, 2005, 3(2): 134-139.
  • Catalog

      Article Metrics

      Article views (329) PDF downloads (42) Cited by()
      Related
      Proportional views

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return