Further research on public-key cryptosystems based on third-order recurrence sequence
Properties of third-order recurrence sequences were investtgated and a new variant of GH public-key cryptosystem was proposed. It is further improved to be a probabilistic public-key cryptosystem. Then security analysis of the proposed schemes were provided. The one-wayness of the proposed scheme wa...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2005-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74668715/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537260282970112 |
---|---|
author | JIANG Zheng-tao 1 SUN Xi 1 TIAN Lei 2 WANG Yu-min 1 |
author_facet | JIANG Zheng-tao 1 SUN Xi 1 TIAN Lei 2 WANG Yu-min 1 |
author_sort | JIANG Zheng-tao 1 |
collection | DOAJ |
description | Properties of third-order recurrence sequences were investtgated and a new variant of GH public-key cryptosystem was proposed. It is further improved to be a probabilistic public-key cryptosystem. Then security analysis of the proposed schemes were provided. The one-wayness of the proposed scheme was equivalent to partial discrete logarithm in ring extension and its semantic security was equivalent to decisional Diffie-Hellman problem in ring extension. At last efficiency analysis of the proposed schemes were provided, and these two encryption schemes need to transfer 2logN and 4logN- bit respectively. |
format | Article |
id | doaj-art-3a17115e5cc7494cba576b4e705d7265 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2005-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-3a17115e5cc7494cba576b4e705d72652025-01-14T08:41:48ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2005-01-0191274668715Further research on public-key cryptosystems based on third-order recurrence sequenceJIANG Zheng-tao 1SUN Xi 1TIAN Lei 2WANG Yu-min 1Properties of third-order recurrence sequences were investtgated and a new variant of GH public-key cryptosystem was proposed. It is further improved to be a probabilistic public-key cryptosystem. Then security analysis of the proposed schemes were provided. The one-wayness of the proposed scheme was equivalent to partial discrete logarithm in ring extension and its semantic security was equivalent to decisional Diffie-Hellman problem in ring extension. At last efficiency analysis of the proposed schemes were provided, and these two encryption schemes need to transfer 2logN and 4logN- bit respectively.http://www.joconline.com.cn/zh/article/74668715/public-key cryptosystemthird-order linear recurrence sequence(trapdoor) discrete logarithminteger factorization |
spellingShingle | JIANG Zheng-tao 1 SUN Xi 1 TIAN Lei 2 WANG Yu-min 1 Further research on public-key cryptosystems based on third-order recurrence sequence Tongxin xuebao public-key cryptosystem third-order linear recurrence sequence (trapdoor) discrete logarithm integer factorization |
title | Further research on public-key cryptosystems based on third-order recurrence sequence |
title_full | Further research on public-key cryptosystems based on third-order recurrence sequence |
title_fullStr | Further research on public-key cryptosystems based on third-order recurrence sequence |
title_full_unstemmed | Further research on public-key cryptosystems based on third-order recurrence sequence |
title_short | Further research on public-key cryptosystems based on third-order recurrence sequence |
title_sort | further research on public key cryptosystems based on third order recurrence sequence |
topic | public-key cryptosystem third-order linear recurrence sequence (trapdoor) discrete logarithm integer factorization |
url | http://www.joconline.com.cn/zh/article/74668715/ |
work_keys_str_mv | AT jiangzhengtao1 furtherresearchonpublickeycryptosystemsbasedonthirdorderrecurrencesequence AT sunxi1 furtherresearchonpublickeycryptosystemsbasedonthirdorderrecurrencesequence AT tianlei2 furtherresearchonpublickeycryptosystemsbasedonthirdorderrecurrencesequence AT wangyumin1 furtherresearchonpublickeycryptosystemsbasedonthirdorderrecurrencesequence |