{"title":"使用并行技术快速实现数字签名","authors":"N. Kishore, Priya Raina, N. Nayar, Mukesh Thakur","doi":"10.1109/CCGE50943.2021.9776382","DOIUrl":null,"url":null,"abstract":"Digital signatures are widely used to check the authenticity of the identity of the signatory of the message/document and the integrity of the message sent. They are also used by the receiver for ensuring non-repudiation by the sender. They play an important role in making day-to-day processes electronic and paperless. Digital signatures are based on public key infrastructure (PKI). The message digest (hash) of the file is signed by the sender using a private key and appended to the file. The recipient extracts the signature, decrypting it with the sender's public key, and verifies if the received digest matches its own hash calculations. However, complex calculations for secure signatures imply that digital signatures are time consuming for large files. Hashing is the basic security mechanism used in digital signatures that is performed by all the parties and consumes most of the time. This paper presents a solution to this problem by using parallel hashing to achieve fast digital signatures, discussing two possible approaches. The first one uses only parallel hashing, keeping the rest of the algorithm the same as the reference algorithm based on RSA. The second approach parallelizes the entire reference algorithm. Both were implemented using the OpenMP framework, and the experimental results show a significant decline in the execution time in both the cases.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Fast Implementation of Digital Signatures Using Parallel Techniques\",\"authors\":\"N. Kishore, Priya Raina, N. Nayar, Mukesh Thakur\",\"doi\":\"10.1109/CCGE50943.2021.9776382\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital signatures are widely used to check the authenticity of the identity of the signatory of the message/document and the integrity of the message sent. They are also used by the receiver for ensuring non-repudiation by the sender. They play an important role in making day-to-day processes electronic and paperless. Digital signatures are based on public key infrastructure (PKI). The message digest (hash) of the file is signed by the sender using a private key and appended to the file. The recipient extracts the signature, decrypting it with the sender's public key, and verifies if the received digest matches its own hash calculations. However, complex calculations for secure signatures imply that digital signatures are time consuming for large files. Hashing is the basic security mechanism used in digital signatures that is performed by all the parties and consumes most of the time. This paper presents a solution to this problem by using parallel hashing to achieve fast digital signatures, discussing two possible approaches. The first one uses only parallel hashing, keeping the rest of the algorithm the same as the reference algorithm based on RSA. The second approach parallelizes the entire reference algorithm. Both were implemented using the OpenMP framework, and the experimental results show a significant decline in the execution time in both the cases.\",\"PeriodicalId\":130452,\"journal\":{\"name\":\"2021 International Conference on Computing, Communication and Green Engineering (CCGE)\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computing, Communication and Green Engineering (CCGE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCGE50943.2021.9776382\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCGE50943.2021.9776382","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fast Implementation of Digital Signatures Using Parallel Techniques
Digital signatures are widely used to check the authenticity of the identity of the signatory of the message/document and the integrity of the message sent. They are also used by the receiver for ensuring non-repudiation by the sender. They play an important role in making day-to-day processes electronic and paperless. Digital signatures are based on public key infrastructure (PKI). The message digest (hash) of the file is signed by the sender using a private key and appended to the file. The recipient extracts the signature, decrypting it with the sender's public key, and verifies if the received digest matches its own hash calculations. However, complex calculations for secure signatures imply that digital signatures are time consuming for large files. Hashing is the basic security mechanism used in digital signatures that is performed by all the parties and consumes most of the time. This paper presents a solution to this problem by using parallel hashing to achieve fast digital signatures, discussing two possible approaches. The first one uses only parallel hashing, keeping the rest of the algorithm the same as the reference algorithm based on RSA. The second approach parallelizes the entire reference algorithm. Both were implemented using the OpenMP framework, and the experimental results show a significant decline in the execution time in both the cases.