期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
NTRU_SSS:Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing 被引量:1
1
作者 Asma Ibrahim Hussein Abeer Tariq MaoLood Ekhlas Khalaf Gbashi 《Computers, Materials & Continua》 SCIE EI 2023年第7期753-769,共17页
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).... With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency. 展开更多
关键词 Post-quantum cryptography NTRU Shamir’s secret sharing public key
下载PDF
SECRET KEY SHARING SCHEME BASED ON THE THEORY OF ALGEBRAIC SEMIGROUPS
2
作者 Wang Yongchuan Li Zichen Yang Yixian (Info. Security Centre of Beijing Univ. of Posts and Telecomm., P. O. Box 126, Beijing 100876) 《Journal of Electronics(China)》 2000年第3期238-241,共4页
How to distribute a secret key information to n authorized departments, denoted as: S1, S2,…, Sn, respectively. For every autherized department Si(i = 1,2,… ,n), there are qi authorized persons, and every authorized... How to distribute a secret key information to n authorized departments, denoted as: S1, S2,…, Sn, respectively. For every autherized department Si(i = 1,2,… ,n), there are qi authorized persons, and every authorized person has the same secret key information as that of any other authorized persons in the same authorized department. The secret key information can be reconstructed completely from the secret key information of any k authorized persons, if there is at least one authorized person included for every authorized department. But other cases, the secret key information cannot be reconstructed completely. In this paper, based on the algebraic semigroup theory, a secret key sharing scheme is proposed, which can satisfy the demand. 展开更多
关键词 semigroup secret key sharing cryptography
下载PDF
基于代数半群理论的密钥分享方案 被引量:5
3
作者 王永传 李子臣 杨义先 《电子科学学刊》 CSCD 2000年第3期509-512,共4页
如何将密钥信息分配给n个被授权的单位(记为:S_1,S_2,…,S_n),每一个被授权单位S_i(i=1,2,…,n)有q_i个被授权人,使得每一个被授权人所得到的密钥信息与该授权人所在的单位的任何其他被授权人所得到的密钥信息是一致的,而任意k个被授权... 如何将密钥信息分配给n个被授权的单位(记为:S_1,S_2,…,S_n),每一个被授权单位S_i(i=1,2,…,n)有q_i个被授权人,使得每一个被授权人所得到的密钥信息与该授权人所在的单位的任何其他被授权人所得到的密钥信息是一致的,而任意k个被授权人所得到的密钥信息,若至少包含每一个被授权单位中的至少一个被授权人的密钥信息时,能够恢复完整的密钥信息,其他情形时,无法完全恢复密钥信息,这种需要经常会遇到。本文利用代数半群理论,给出了一种能实现这种密钥分享的方案。 展开更多
关键词 代数半群 密钥分享 密码学
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部