Provably secure public key cryptosystem based on chebyshev polynomials

被引:5
|
作者
Yan, Shijie [1 ]
Zhen, Ping [1 ]
Min, Lequan [1 ,2 ]
机构
[1] School of Automation and Electrical Engineering, University of Science and Technology Beijing, Beijing
[2] School of Mathematics and Physics, University of Science and Technology Beijing, Beijing
来源
Journal of Communications | 2015年 / 10卷 / 06期
关键词
Chebyshev polynomials; Chosen ciphertext attack; Provable security; Public key crypto-system;
D O I
10.12720/jcm.10.6.380-384
中图分类号
学科分类号
摘要
Chebyshev polynomials based public key cryptosystem (CPPKC), proposed by L. Kocarev in 2003, has emerged as a new research field in cryptography and attracted a lot of attentions in recent years. Although provable security in traditional public key cryptosystem has already been developed about twenty years, no relevant security proof research has been found about CPPKC. Aiming at the disability of CPPKC to resist against the adaptive chosen ciphertext attack, we construct a provably secure CPPKC, namely PS-CPPKC, which is designed utilizing the benefits of hash function and its security proof is completed under the Cheybshev Diffie-Hellman problem (CDHP) assumption by probabilistic analyses and computation in random oracle model. This is our primary exploration and it shows that provable security theory can combine well with CPPKC. © 2015 Journal of Communications.
引用
收藏
页码:380 / 384
页数:4
相关论文
共 50 条
  • [41] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    INFORMATION AND COMPUTATION, 1999, 151 (1-2) : 17 - 31
  • [42] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [43] Cryptanalysis of a Public Key Cryptosystem Based on the Matrix Combinatorial Problem
    Lee, Moon Sung
    INFORMATICA, 2013, 24 (02) : 219 - 230
  • [44] Efficient and provably secure password-based group key agreement protocol
    Zheng, Ming-Hui
    Zhou, Hui-Hua
    Li, Jun
    Cui, Guo-Hua
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 948 - 953
  • [45] Public-key Cryptosystem Based on Permutation Rational Function
    Wei, Pengcheng
    Wei, Ran
    Zhu, Yingxian
    Yang, Xinbo
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 452 - 454
  • [46] An Extended Knapsack Public Key Cryptosystem
    Ji XiaoPing
    Zhang HaiBin
    Wu BoYing
    Li GuangYu
    MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 678 - +
  • [47] Efficient provably secure password-based explicit authenticated key agreement
    Ruan, Ou
    Kumar, Neeraj
    He, Debiao
    Lee, Jong-Hyouk
    PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 50 - 60
  • [48] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [49] Provably secure identity-based authenticated key agreement protocols with malicious private key generators
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    INFORMATION SCIENCES, 2011, 181 (03) : 628 - 647
  • [50] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244