期刊文献+

NTRU的有效实现方案研究 被引量:2

Research on efficient NTRU implementations scheme
下载PDF
导出
摘要 NTRU是Jeffrey Hoffstein等在1996年提出的一种新的公钥密码体制,其安全性基于大维数格中寻找最短向量的数学难题。NTRU公开密钥体制算法主要对象是对N-1次多项式进行加、减、乘、模运算,所以该加密解密的速度比RSA等著名算法快得多,和椭圆曲线密码体制一起,成为新一代最优秀的公钥密码体制。对NTRU的设计原理以独特的思维方法进行了分析,并对主要算法进行了优化设计和实现分析。特别地,给出了算法的优化分析及完整实现方案,大大提高了系统的性能。 The NTRU cryptosystem is a new public key cryptographic algorithm that is developed by J. Hoffstein, in 1996, Its security is based on the hard mathematical problem of finding the shortest vector in a lattice of very high dimension. The principal objects used by the NTRU PKCS are polynomial of degree N-1 having integer coefficient which are operated by addition, subtraction, multiplication and modular arithmetic. Encryption and decryption with NTRU are extremely faster than RSA, and together with ECC, will become the most excellent one of the new public key cryptosystems. The basic principle of NTRU is analyzed in a creative way, and then the main algorithm is analyzed and optimized, specially giving the analysis and integrated scheme, greatly improves the performance of this system.
作者 尹强 李新社
出处 《计算机工程与设计》 CSCD 北大核心 2007年第6期1309-1312,共4页 Computer Engineering and Design
关键词 NTRU公钥密码体制 多项式截断环 模运算 卷积运算 NTRU PCKS trtmcated polynomial rings lattice modular arithmetic convolution algorithm
  • 相关文献

参考文献9

二级参考文献21

  • 1刘衍衍.计算机安全技术[M].长春:吉林科学技术出版社,1997..
  • 2Varadharajan V,Allen P,Black S.An analysis of the proxy problem in distributed systems[C].In:Proc 1991 IEEE Computer Society Symp on Research in Security and Privacy,1991:255-275.
  • 3Mambo M,Usuda K,Okamoto E.Proxy signature for delegating signing operation[C].In:Proceedings of the 3rd ACM conference on computer and communications security India,New Delhi,1996:48-57.
  • 4Lee B,Kim H,Kim K.Secure mobile agent using strong non-designated proxy siguature[C].In:Information Security and Privacy(ACISP'01),LNCS 2119 ,Berlin:Springer-Verlag,2001:474-486.
  • 5Hoffstein J,Pipher J,Silverman J.NTRU:A Ring-Based Public Key Cryptosystem[C].In:JP Buhler ed.in Proceedings of Algorithm Number Theory(ANTS Ⅲ) ,LNCS 1423 ,Berlin :Springer-Verlag, 1998:267-288.
  • 6Hoffstein J ,Graham N ,Pipher J.NTRUSign:digital Signatures Using the NTRU Lattice Preliminary Draft 2.http ://www.ntm.com,2002.
  • 7Hoffstein J,Graham N,Pipher J et al.NTRUSign:digital Signatures Using the NTRU Lattice[C].In:M Joye ed. CT-RSA'03,Lecture Notes in Computer Science ,Springer-Verlag,2003:122-140.
  • 8Wang G,Bao F,Zhou J et al.Security Analysis of some proxy signatures[C].In:Information security and cryptology-ICISC'OS 2004,preliminary version is available at http://eprint.iacr.org/2003/196.
  • 9H-M Sun,B T Hsieh. On the security of some proxy signature schemes.http://eprint.iacr.org/2003/068.
  • 10Shum K,K Wei V.A strong proxy signature scheme with proxy signer privacy protection[C].In :Eleventh IEEE International Workshop on Enabling Technologies :Infrastructure for Collaborative Enterprises ( WETICE'02 ), 2002:1080- 1383.

共引文献21

同被引文献13

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部