Provably secure public key cryptosystem based on chebyshev polynomials

被引:5
|
作者
Yan, Shijie [1 ]
Zhen, Ping [1 ]
Min, Lequan [1 ,2 ]
机构
[1] School of Automation and Electrical Engineering, University of Science and Technology Beijing, Beijing
[2] School of Mathematics and Physics, University of Science and Technology Beijing, Beijing
来源
Journal of Communications | 2015年 / 10卷 / 06期
关键词
Chebyshev polynomials; Chosen ciphertext attack; Provable security; Public key crypto-system;
D O I
10.12720/jcm.10.6.380-384
中图分类号
学科分类号
摘要
Chebyshev polynomials based public key cryptosystem (CPPKC), proposed by L. Kocarev in 2003, has emerged as a new research field in cryptography and attracted a lot of attentions in recent years. Although provable security in traditional public key cryptosystem has already been developed about twenty years, no relevant security proof research has been found about CPPKC. Aiming at the disability of CPPKC to resist against the adaptive chosen ciphertext attack, we construct a provably secure CPPKC, namely PS-CPPKC, which is designed utilizing the benefits of hash function and its security proof is completed under the Cheybshev Diffie-Hellman problem (CDHP) assumption by probabilistic analyses and computation in random oracle model. This is our primary exploration and it shows that provable security theory can combine well with CPPKC. © 2015 Journal of Communications.
引用
收藏
页码:380 / 384
页数:4
相关论文
共 50 条
  • [31] Provably secure authenticated tree based group key agreement
    Dutta, R
    Barua, R
    Sarkar, P
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 92 - 104
  • [32] A threshold key escrow scheme based on public key cryptosystem
    Cao, ZF
    SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2001, 44 (04): : 441 - 448
  • [33] A provably secure multi-server authentication scheme based on Chebyshev chaotic map
    Chen, Rui
    Mou, Yongcong
    Li, Wei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [34] Unconditionally secure public-key cryptosystem using entangled quantum states
    Li, Xiaoyu
    Ma, Yuqing
    Information Technology Journal, 2013, 12 (16) : 3820 - 3824
  • [35] On Public-key Encryption Scheme Based on Chebyshev Maps
    Zhang, Linhua
    Mao, Xiuli
    Duan, Wanyu
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1110 - 1114
  • [36] A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials
    Shen, Zuming
    Zeng, Peng
    Qian, Yuyin
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2018, 6 : 14560 - 14566
  • [37] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 219 - 233
  • [38] Provably Secure Identity-based Group Key Exchange Protocol
    SangJae Moon
    中国通信, 2007, 4 (04) : 11 - 22
  • [39] Provably Secure Identity-based Group Key Exchange Protocol
    Cao Chunjie
    Ma Jianfeng
    SangJae Moon
    CHINA COMMUNICATIONS, 2007, 4 (04) : 11 - 22
  • [40] Provably secure threshold public-key encryption with adaptive security and short ciphertexts
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Farras, Oriol
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2012, 210 : 67 - 80