期刊文献+

容错Rao-Nam私钥密码体制 被引量:1

A fault-tolerant Rao-Nam's private-key cryptosystem
原文传递
导出
摘要 针对Rao-Nam私钥密码体制修正案进行分析及改进.首先,考虑密文通过有扰信道时对修正案进行改进,提出加密与纠错相结合的加密纠错体制.其次,利用错误图样携带附加信息的方法提高了修正案的传信率.分析表明,新方案与修正案相比,在安全性、纠错能力、传信率、有扰信道的正确解密概率、长密钥问题等方面有很大提高. The revised scheme of Rao-Nam's private-key cryptosystem was analyzed and improved.When the ciphertext was transmitted through interference channels,the revised scheme was improved and a private-key cryptosystem with error correcting capability was proposed.In addition,the information rate of the revised scheme was improved using the added error vector to carry additional information.Comparing with the original revised scheme,the generalized scheme is better in the aspects of security,error correcting capability,information rate,probability of correct decipher,and long keys.
出处 《大连海事大学学报》 CAS CSCD 北大核心 2011年第4期78-82,共5页 Journal of Dalian Maritime University
基金 中央高校基本科研业务费专项资金资助项目(2009QN076)
关键词 私钥密码体制 纠错码 传信率 纠错能力 正确解密概率 private-key cryptosystem error-correcting codes information transmitting rate error-correcting capability probability of correct decipher
  • 相关文献

参考文献11

  • 1RAO T R N, NAM K H. Private-key algebraic-code crypt osystems[ C] //Advances in Cryptology-CRYPTO' 86, Lec ture Notes in Computer Science. Berlin: Springer, 1987, 263:35-48.
  • 2RAO T R N, NAM K H. Private-key algebraic-code en cryption[J]. IEEE Transactions on Information Theory, 1989, 35(4) :829-833.
  • 3STRUIK R, Van TILBURG J. The Rao-Nam scheme is insecure against a chosen-plaintext attack[ C]//Advances in CryptologyCRYPTO' 87, Lecture Notes in Computer Science. Berlin: Springer, 1988, 293 : 445-457.
  • 4DENNY W F. Encryptions using linear and non-linear codes: Implementation and security considerations[J]. Dis sertation Abstracts International Part B: Science and Engi neering, 1989, 49(10) :64.
  • 5STRUIK R. On the Rao-Nam scheme using nonlinear codes [C]// Proc. of the 1991 IEEE Int Symp on Information Theory. [S.1. ] :IEEE, 1991:174.
  • 6刘金龙,许宗泽.Rao-Nam私钥密码体制的修正[J].电子与信息学报,2005,27(8):1287-1289. 被引量:3
  • 7HIN P J M. Channel-Error-Correcting Privacy Cryptosys terns[ D]. Delft: Delft University of Technology, 1986.
  • 8王新梅.M公钥的推广及通过有扰信道时的性能分析.电子学报,1986,14(4):84-90.
  • 9SUN H M. Improving the information rate of a private key cryptosystem based on product codes [J]. INFORMA TICA, 2002, 13(1) :105110.
  • 10SENDRIER N. Efficient generation of binary words given weight, cryptography and coding[ C] // Lecture Notes in Computer Science. Berlin: Springer, 1995, 1025: 184-187.

二级参考文献8

  • 1Berlekamp E R, McEliece R J, van Tilborg H C A. On the inherent intractability of certain coding problems. IEEE Trans. on Information Theory, 1978, IT-24:384 - 386.
  • 2McEliece R J. A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 1978:42 - 44, 114 - 116.
  • 3Rao T R N. Joint encryption and error correction schemes. Confer ence Proceedings-11^th Annual International Symposium on Com puter Architecture, Ann Arbor, Mich, USA., 1984:240 - 241.
  • 4Rao T R N, Nam K H. Private-key algebraic-code encryptions.IEEE Trans. on Information Theory, 1989, 35(4): 829 - 833.
  • 5Struik R, Tilburg J. The Rao-Nam scheme is insecure against a chosen-plaintext attack. Advances in Cryptology-CRYPTO '87.New York: Springer-Verlag, 1988:458 - 461.
  • 6Struik R. On the Rao-Nam scheme using nonlinear codes. Infor mation Theory Proceedings. 1991 IEEE International Symposium,Eindhoven University of Technology, 1991: 174 - 174.
  • 7Denny W F. Encryptions using linear and nonlinear codes:implementation and security considerations. [Ph.D. dissertation],The Center for Advanced Computer Studies, University of Southwestem Louisiana, Lafayette, 1988.
  • 8Sun H M, Hwang T. Key generation of algebraic-code crypto systems. Computer Math. Application, 1994, 27(2): 99 - 106.

共引文献3

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部