Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem

被引:0
作者
Huang, Huawei [1 ,2 ]
Yang, Bo [1 ]
Zhu, Shenglin [1 ]
Xiao, Guozhen [2 ]
机构
[1] South China Agr Univ, Coll Informat, Guangzhou 510642, Guangdong, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
来源
PROVABLE SECURITY | 2008年 / 5324卷
关键词
public key cryptosystem; matrix semigroup action; DDH problem; semantically secure;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper proposes a new generalized ElGamal public key encryption scheme based on a new Diffie-Hellman problem, so-called EDDH problem, which DDH problem can be reduced to. This scheme is one-way if and only if ECDH assumption holds and it is semantically secure in the standard model if and only if EDDH assumption holds. Since EDDH assumption still holds for generic bilinear groups, this encryption scheme adds to the growing toolkit of provable security primitives that can be used by the protocol designer looking to build complex secure systems with a sound basis.
引用
收藏
页码:1 / +
页数:4
相关论文
共 50 条
  • [31] Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem
    Duan, Gangqiang
    Li, Shuai
    ELECTRONICS, 2023, 12 (18)
  • [32] Review of Public-Key Cryptosystem Based on the Error Correcting Code
    LI Zhongyuan
    QU Chengqin
    ZHOU Xueguang
    ZHUO Lifeng
    Wuhan University Journal of Natural Sciences, 2014, 19 (06) : 489 - 496
  • [33] PUBLIC-KEY CRYPTOSYSTEM DESIGN BASED ON FACTORING AND DISCRETE LOGARITHMS
    HARN, L
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (03): : 193 - 195
  • [34] A construction of public-key cryptosystem based on singular simultaneous equations
    Kasahara, M
    Sakai, R
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01): : 74 - 80
  • [35] New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group
    Meshram, Chandrashekhar
    Li, Xiangxue
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (02) : 391 - 400
  • [36] Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment
    Zhengjun Jing
    Chunsheng Gu
    Chunpeng Ge
    Peizhong Shi
    Mobile Networks and Applications, 2021, 26 : 1609 - 1615
  • [37] Skew-cyclic codes based public-key cryptosystem approach
    Guzeltepe, Murat
    Calkavur, Selda
    SECURITY AND PRIVACY, 2022, 5 (06):
  • [38] Encrypted signal-based reversible data hiding with public key cryptosystem
    Chen, Yu-Chi
    Shiu, Chih-Wei
    Horng, Gwoboa
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1164 - 1170
  • [39] Public Key Cryptosystem Based on Finite Automata for Multilateral Antiterrorist Activity Support
    Margarov, Gevorg
    Chopuryan, Siranush
    TERRORISM AND THE INTERNET: THREATS - TARGET GROUPS - DERADICALISATION STRATEGIES, 2010, 67 : 183 - 188
  • [40] Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment
    Jing, Zhengjun
    Gu, Chunsheng
    Ge, Chunpeng
    Shi, Peizhong
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04) : 1609 - 1615