期刊文献+

一种改进的公钥加密体制

An Improved Public Key Encryption System
下载PDF
导出
摘要 在不降低安全性的情况下,对一种简单而高效的公钥密码算法的改进,通过利用矩阵变换的方法对其改进,使其困难性假设容易保证(矩阵一般构成环,且存在零元素,分析比较困难)、加密速度更快(一次可以处理多位);通过把明文分为两部分后一部分添加2r个字节使其避免了原来随机K带来的格攻击,同时又增加了随机性使得原有方案更安全。并且基于此改进提出了一种签名算法,证明了该签名算法也是安全的。 Without compromising safety in the case of a simple and efficient public key cryptography algorithm,, by using matrix transformation method for its improvement, making it difficult to ensure easy assumption (general matrix form a ring, and there is zero element analysis more difficult), the encryption is faster (more than one can handle), through the latter part of the plaintext is divided into two parts to avoid adding 2r byte random K brings the original lattice attack, while increasing the random original program makes safer. Based on this improved and proposed a signature algorithm proved that the signature algorithm is safe.
作者 胡选攀 潘瑜
出处 《电脑与信息技术》 2014年第1期25-27,31,共4页 Computer and Information Technology
基金 国家自然科学基金项目(项目编号:61363080)
关键词 格基归约 公钥密码体制 算法 格攻击 安全 lattice reduction public-key cryptosystem algorithm lattice attack security
  • 相关文献

参考文献6

二级参考文献25

  • 1陈克耀,谢康林.NTRU算法的分析[J].计算机工程,2004,30(B12):308-309. 被引量:6
  • 2褚映红,胡予濮,胡新祥.基于NTRUSign的代理签名方案[J].计算机工程与应用,2005,41(8):131-133. 被引量:6
  • 3陈宇锋,钱森水,赵立杰.NTRU公钥密码体制及其算法的优化[J].湘南学院学报,2005,26(2):61-65. 被引量:2
  • 4Pailler P. Public-Key Cryptosystems Based on Composite Degree Residue Classes[C]//Proceedings of EuroCrypt'99. [S. l.]: Springer Verlag, 1999:223-238.
  • 5Namgard I, Jurik M, Generalisation A. A Simplification and Some Applications of Paillier's Probabilistic Public-key System[C]// Proceedings ofPKC'01. [S. l.]: Springer-Verlag, 2000:119-136.
  • 6Bresson E, Catalano D, Pointcheval D. A Simple Public-key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications[C]//Proceedings of Advances in Cryptology- ASIACRYPT'03. Berlin, Germany: Springer-Veriag, 2003: 27-54.
  • 7Cramer R, Damgard I, Nielsen J B. Multiparty Computation from Threshold Homomorphic Encryption[C]//Proceedings of Advances in Cryptology-EUROCRYPT'01. [S. l.]: Springer-Verlag, 2001: 280- 300.
  • 8Colleen Marie O'Rourke.Efficient NTRU implementations[D].Worcester Polytechnic Institute,2002.
  • 9Atul Kahate.Cryptography and network security[M].北京:清华大学出版社,2005.
  • 10Hoffstein J,Pipher J,Silverman J H.NSS:The NTRU signature scheme[EB/OL].2000.www.ntru.com.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部