PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density

被引:3
作者
Ping, Yuan [1 ,2 ]
Wang, Baocang [1 ,3 ]
Tian, Shengli [1 ]
Zhou, Jingxian [2 ]
Ma, Hui [1 ]
机构
[1] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
[2] Civil Aviat Univ China, Informat Technol Res Base Civil Aviat Adm China, Tianjin 300300, Peoples R China
[3] Xidian Univ, Key Lab Comp Networks & Informat Secur, Minist Educ, Xian 710071, Shaanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
public key cryptography; knapsack problem; low-density attack; lattice reduction; CRYPTANALYSIS; SIGNATURES; REDUCTION; SECURITY;
D O I
10.3390/info10020075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By introducing an easy knapsack-type problem, a probabilistic knapsack-type public key cryptosystem (PKCHD) is proposed. It uses a Chinese remainder theorem to disguise the easy knapsack sequence. Thence, to recover the trapdoor information, the implicit attacker has to solve at least two hard number-theoretic problems, namely integer factorization and simultaneous Diophantine approximation problems. In PKCHD, the encryption function is nonlinear about the message vector. Under the re-linearization attack model, PKCHD obtains a high density and is secure against the low-density subset sum attacks, and the success probability for an attacker to recover the message vector with a single call to a lattice oracle is negligible. The infeasibilities of other attacks on the proposed PKCHD are also investigated. Meanwhile, it can use the hardest knapsack vector as the public key if its density evaluates the hardness of a knapsack instance. Furthermore, PKCHD only performs quadratic bit operations which confirms the efficiency of encrypting a message and deciphering a given cipher-text.
引用
收藏
页数:27
相关论文
共 49 条
[31]  
Nguyen P, 1997, LECT NOTES COMPUT SC, V1294, P198
[32]  
Nguyen PQ, 2005, LECT NOTES COMPUT SC, V3788, P41
[33]  
Nguyen PQ, 2001, LECT NOTES COMPUT SC, V2146, P146
[34]  
Niemi V., 1990, LNCS, V473, P405
[35]  
Odlyzko Andrew M., 1990, Cryptology and Computational Number Theory, V42, P75, DOI 10.1090/psapm/042
[36]  
Okamoto T, 2000, LECT NOTES COMPUT SC, V1880, P147
[37]  
OMURA K, 2001, IEICE T FUND ELECTR, V84, P1564
[38]  
Orton G., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P112, DOI 10.1007/BFb0053429
[39]  
Pieprzyk J.P., 1985, LNCS, V219, P73
[40]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]