期刊文献+

基于遍历矩阵的公钥加密方案 被引量:11

Public Key Encryption Scheme Based on the Ergodic Matrices
下载PDF
导出
摘要 目前的公钥加密方案受到来自量子计算的威胁,研究在量子计算下安全的公开加密算法具有重要的意义.本文提出了遍历矩阵的概念,并给出了遍历矩阵的性质.同时提出了基于有限域上遍历矩阵的双侧幂乘问题(TEME:Two-side Ergodic Matrices Exponentiation),并证明了求解TEME问题是NP完全的.据此,本文提出了一个新的公钥加密方案,并在标准模型下,证明了该方案基于TEME问题的安全性,即该方案具有适应性选择密文攻击下的不可区分性. The current public key encryption schemes are vulnerable under the threat from quantum computing,it is necessary to research secure public key encryption algorithm under quantum computing.The concept of ergodic matrices and its property are given,and a new difficult problem named Two-side Ergodic Matrices Exponentiation(TEME) is proposed,which is proved at least NP-complete.Accordingly,we present a new public key encryption scheme based on ergodic matrices,and proved it is secure based on the TEME problem in the standard model,that is,the INDistinguishability against adaptively Chosen Ciphertext Attack(IND-CCA).
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第8期1908-1913,共6页 Acta Electronica Sinica
基金 国家教育部博士点基金(No.20050183032)
关键词 公钥密码 遍历矩阵 NP完全 可证明安全性 public key cryptography ergodic matrix NP-Complete proved security
  • 相关文献

参考文献13

  • 1W Diffie,M E Hellman.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
  • 2郭兴阳.基于攻击的数字签名安全性分析研究 .湖南长沙:国防科学技术大学,2006.4.
  • 3钱海峰.若干数字签名方案的分析、设计与应用 .上海:上海交通大学,2006.6.
  • 4P W Shor.Algorithms for quantum computation:discrete logarithms and factoring .SIAM Journal on Computing,1994,26(5):1484-1509.
  • 5J Proos,C Zalka.Shor’s discrete logarithm quantum algorithm for elliptic curves .http://arxiv.org/abs/quant-ph/0301141,2003-1-25.
  • 6T G Draper.Addition on a quantum computer .http://arxiv.org/abs/quant-ph/ 0008033,2000-9-7.
  • 7L M K Vandersypen,M Steffen,G Breyta,C S Yannoni,M H Sherwood,I L Chuang.Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance[J].Nature,2001,414(6866):883-887.
  • 8H Hfner,W Hsel,C F Roos,J Benhelm,D Chek al kar,M Chwalla,T Kber,U D Rapol,M Riebe,P O Schmidt,C Becher,O Ghne,W Dr,R Blatt.Scalable multiparticle entanglement of trapped ions[J].Nature,2005,438(7068):643-646.
  • 9S Micali,C Rackoff,B Sloan.The notion of security for probabilistic cryptosystems[J].SIAM Journal on Computing,1988,17(2):412-426.
  • 10PEI Shihui ZHAO Hongwei ZHAO Yongzhe.Public Key Cryptography Based on Ergodic Matrices over Finite Field[J].Wuhan University Journal of Natural Sciences,2006,11(6):1525-1528. 被引量:8

二级参考文献10

  • 1赵永哲,黄声烈,姜占华.GF(2^k)上的遍历矩阵及其特性分析[J].小型微型计算机系统,2005,26(12):2135-2139. 被引量:14
  • 2L.Rudolf.Introduction to Finite Field and their Applications[]..1994
  • 3Goldwasser S,Micali S.Probabilistic Encryption[].Journal of Computer and System Sciences.1984
  • 4Dolev D,Dwork C,Naor M.Non-malleable cryptography[].SIAM Journal on Computing.2000
  • 5Menezes AJ,Van Oorschot PC,Vanstone SA.Handbook of Applied Cryptography[].The CRC Press Series on Discrete Mathematics and Its Applications.1997
  • 6Schneier B.Applied Gryptography: Protocols, Algorithms, and Source Code in C[]..1996
  • 7Aviad Kipnis,Adi Shamir.Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization[].Advances in Cryptology-Crypto’.1999
  • 8Faugère,Jean-Charles,Antoine Joux.Algebraic crypta-nalysis of hidden field equation (HFE)cryptosystemsusing Grbner bases[].Advances inCryptology-CRYPTO’’.2003
  • 9Nicolas C.The Security of Hidden Field Equations ( HFE) Cryptographers[].Track RSA Conference.2001
  • 10Zhao Yongzhe,Wang Liou,Zhang Wei.Information-Ex- change Using the Ergodic Matrices in GF (2)[].th In- ternational Conference on Applied Cryptography and Net- work Security ( ACNS).2004

共引文献7

同被引文献68

  • 1赵永哲,黄声烈,姜占华.GF(2^k)上的遍历矩阵及其特性分析[J].小型微型计算机系统,2005,26(12):2135-2139. 被引量:14
  • 2赵永哲,姜占华,黄声烈.基于F_2上遍历矩阵的Shamir三次传递协议的实现[J].小型微型计算机系统,2006,27(6):986-991. 被引量:11
  • 3孙永雄,赵永哲,杨永健,李荣.基于遍历矩阵的单向(陷门)函数的构造方案[J].吉林大学学报(信息科学版),2006,24(5):555-560. 被引量:7
  • 4PEI Shihui ZHAO Hongwei ZHAO Yongzhe.Public Key Cryptography Based on Ergodic Matrices over Finite Field[J].Wuhan University Journal of Natural Sciences,2006,11(6):1525-1528. 被引量:8
  • 5Zhao Yongzhe, Wang Liou, Zhang Wei. Information-ex- change using the ergodic matrices in GF(2) [C]//2nd Inter- national Conference, ACNS 2004. Amsterdam: Icisa Press, 2004: 388-397.
  • 6Sun Yongxiong, Zhao Yongzhe, Yang Yongjian, et al. Scheme to construct one-way (trapdoor) functions based on ergodic matrices [J]. Journal of Jilin University: Information Science Edition, 2006, 24(5): 555-560(Ch).
  • 7Monico C. Semirings and Semigroup Actions in Public-Key Cryptography [D]. Notre Dame: University of Notre Dame, 2002.
  • 8Maze G. Algebraic Methods for Constructing One-Way Trapdoor Functions [D]. Notre Dame: University of Notre Dame, 2003.
  • 9Huang Huawei. Cryptographic Applications of Semigroup Action Problem [D]. Xi'an: Xidian University, 2008(Ch).
  • 10Seroussi G. Table of Low- Weight Binary Irreducible Poly- nomials [R]. Hewlett-PacKard Technical Report HPL-98-135, 1998.

引证文献11

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部