期刊文献+

基于热带LP矩阵双边作用问题的混合加密方案

Hybrid Encryption Scheme Based on Two-sided Action Problem of Tropical LP Matrix
下载PDF
导出
摘要 近年来,随着量子计算机的发展,当前广泛使用的公钥密码体制面临严峻挑战.在后量子密码时代,探索新型公钥密码体制显得尤为重要.采用热带LP矩阵双边作用问题,提出一种Oracle双边热带矩阵作用假设.根据假设,设计了一种包含对称加密、消息认证码和哈希函数的混合加密方案.方案中的双边作用问题可以归约为求解热带多项式方程组,求解该方程组是一个NP困难问题.在标准模型下该混合加密方案具有在选择密文攻击下的不可区分性. In recent years,with the development of quantum computers,the widely used public key cryptosystem is facing serious challenges.In the post-quantum cryptography era,it is particularly important to explore new public key cryptosystems.In this paper,the two-sided action problem of tropical LP matrix is adopted,and an Oracle two-sided action hypothesis of tropical matrix is proposed.According to the hypothesis,a hybrid encryption scheme including symmetric encryption,message authentication code and hash function is designed.The two-sided action problem in the scheme can be reduced to solving a system of tropical polynomial equations,which is a NP-hard problem.Under the standard model,the hybrid encryption scheme is indistinguishable under chosen ciphertext attacks.
作者 潘戈洋 黄华伟 姜鑫 PAN Ge-yang;HUANG Hua-wei;JIANG Xin(School of Mathematical Sciences,Guizhou Normal University,Guiyang 550025,China)
出处 《嘉应学院学报》 2024年第3期1-8,共8页 Journal of Jiaying University
基金 国家自然科学基金资助项目(61462016) 贵州省科学技术基金资助项目(黔科合基础-ZK[2021]一般313号)。
关键词 公钥密码 混合加密 热带Linde-de-la Puente矩阵 热带代数半环 public key passwords hybrid encryption tropical Linde-de-la Puente matrix tropical algebraic semi-ring
  • 相关文献

参考文献3

二级参考文献36

  • 1赵永哲,黄声烈,姜占华.GF(2^k)上的遍历矩阵及其特性分析[J].小型微型计算机系统,2005,26(12):2135-2139. 被引量:14
  • 2赵永哲,姜占华,黄声烈.基于F_2上遍历矩阵的Shamir三次传递协议的实现[J].小型微型计算机系统,2006,27(6):986-991. 被引量:11
  • 3孙永雄,赵永哲,杨永健,李荣.基于遍历矩阵的单向(陷门)函数的构造方案[J].吉林大学学报(信息科学版),2006,24(5):555-560. 被引量:7
  • 4PEI Shihui ZHAO Hongwei ZHAO Yongzhe.Public Key Cryptography Based on Ergodic Matrices over Finite Field[J].Wuhan University Journal of Natural Sciences,2006,11(6):1525-1528. 被引量:8
  • 5J Proos,C Zalka.Shor’s discrete logarithm quantum algorithm for elliptic curves .http://arxiv.org/abs/quant-ph/0301141,2003-1-25.
  • 6T G Draper.Addition on a quantum computer .http://arxiv.org/abs/quant-ph/ 0008033,2000-9-7.
  • 7L M K Vandersypen,M Steffen,G Breyta,C S Yannoni,M H Sherwood,I L Chuang.Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance[J].Nature,2001,414(6866):883-887.
  • 8H Hfner,W Hsel,C F Roos,J Benhelm,D Chek al kar,M Chwalla,T Kber,U D Rapol,M Riebe,P O Schmidt,C Becher,O Ghne,W Dr,R Blatt.Scalable multiparticle entanglement of trapped ions[J].Nature,2005,438(7068):643-646.
  • 9S Micali,C Rackoff,B Sloan.The notion of security for probabilistic cryptosystems[J].SIAM Journal on Computing,1988,17(2):412-426.
  • 10Pei Shi-hui,Zhao Yong-zhe,Zhao Hong-wei.Construct public key encryption scheme using ergodic matrices over GF(2) .Proceedings of the 4th International Conference on Theory and Applications of Models of Computation,TAMC 2007 .Berlin:Springer-Verlag,2007.181-188.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部