期刊文献+

格的归约理论和它在密码学中的应用

Lattice Rounding Technique and Its Cryptographic Applications
原文传递
导出
摘要 介绍和讨论了格理论在公钥密码体制中的应用。利用格的归约技术可以分析研究计算部分密钥位与整个密钥位的计算复杂性。在均匀模式下,计算基于公钥系统的Okamoto协议的2 log log p密钥位与计算整个密钥的难度是相同的。用格的理论建立了一个公钥密码系统,且该系统是安全的,除非能够在多项式时间内从n维格L中找到最短的非零向量。 This paper introduces and discusses of lattice rounding technique and its cryptographic applications. Using lattice rounding technique, it analyzes the hardness of computing the most significant bits of key and the entire secret. In a non - uniform model computing the 21oglogp bits of the secret key in Okamoto' s scheme is as hard as computing the entire key. And we can construct a public key cryptosystem, which is secure unless the problem that found the shortest nonzero vector in a lattice L can be solved in polynomial time.
出处 《信息安全与通信保密》 2000年第3期9-12,共4页 Information Security and Communications Privacy
关键词 密钥最有效位 lattice, MSB of the secret key
  • 相关文献

参考文献5

  • 1[1]Babai L. On Lovasz' lattice reduction and the nearest lattice point problem. Combinatorica, 1986; (6):1~13
  • 2[2]Boneh D, Venkatesan R. Hardness of computing the most significant bits of secret keys in Diffe-Hellman andrelated schemes. In: Proc. of Crypto' 96, Springer-Vedag, 1996
  • 3[3]Ajtai M, Dwork C. A public-key cryptosystems with worst-case/average-case equivalence. In: STOC' 97, El Paso, Texas, ACM Press, 1997:284~293
  • 4[4]Boneh D, Venkatesan R. Rounding in lattices and its cryptographic applications. In: SODA'97, New Orleans Lousianaa, ACM Siam, 1997:675~681
  • 5[5]Ajtai M. Generating Hard Instances of Lattice Problems. In: STOC'96, Philadephia, Pennsylvania, ACM Press,1996:99~108

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部