A New Secure Encryption Scheme Based on Group Factorization Problem

被引:2
|
作者
Cong, Yue [1 ]
Hong, Haibo [2 ]
Shao, Jun [2 ]
Han, Song [2 ]
Lin, Jianhong [3 ]
Zhao, Shuai [2 ,4 ]
机构
[1] Zhejiang Agr Business Coll, Shaoxing 312088, Peoples R China
[2] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
[3] Zhejiang Ponshine Informat Technol Co, Hangzhou 310000, Peoples R China
[4] Zhejiang Gongshang Univ, Comp Ctr, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption scheme; group factorization problem; logarithmic signatures; random covers; PUBLIC-KEY CRYPTOSYSTEM; CRYPTANALYSIS; MATRICES; ALGORITHMS;
D O I
10.1109/ACCESS.2019.2954672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As special types of factorization of finite groups, logarithmic signatures and covers have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, MST3 and eMST(3). In particular, as a natural analogue of integer factorization problem (IFP), group factorization problem (GFP) and its hardness assumption over certain factorization basis, referred as logarithmic signature, play a core role in the security arguments for the family of MST cryptosystems. Security is not the unique goal of designing a cryptosystem. Instead, efficiency is also a major issue. In this paper, we design a new secure encryption scheme based on group factorization problem (GFP). Furthermore, we present the security analysis and demonstrate the performance of our scheme. Comparing with eMST3, our scheme is simplified with more efficiency.
引用
收藏
页码:168728 / 168735
页数:8
相关论文
共 50 条
  • [1] A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type
    Hong, Haibo
    Wang, Licheng
    Shao, Jun
    Yan, Jianhua
    Ahmad, Haseeb
    Wei, Guiyi
    Xie, Mande
    Yang, Yixian
    COMPUTER JOURNAL, 2019, 62 (12) : 1840 - 1848
  • [2] A visually secure image encryption scheme based on adaptive block compressed sensing and non-negative matrix factorization
    Shi, Yuandi
    Chen, Rongrong
    Liu, Donglin
    Wang, Bin
    OPTICS AND LASER TECHNOLOGY, 2023, 163
  • [3] A visually secure image encryption scheme based on compressive sensing
    Chai, Xiuli
    Gan, Zhihua
    Chen, Yiran
    Zhang, Yushu
    SIGNAL PROCESSING, 2017, 134 : 35 - 51
  • [4] Secure Variants of the Square Encryption Scheme
    Clough, Crystal Lee
    Ding, Jintai
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 153 - +
  • [5] A new encryption scheme for multivariate quadratic systems
    Chen, Jiahui
    Ning, Jianting
    Ling, Jie
    Lau, Terry Shue Chien
    Wang, Yacheng
    THEORETICAL COMPUTER SCIENCE, 2020, 809 : 372 - 383
  • [6] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [7] A secure image encryption scheme based on chaotic maps and affine transformation
    Ahmad, Jawad
    Hwang, Seong Oun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13951 - 13976
  • [8] A secure key authentication scheme for cryptosystems based on DLP in group ring
    Kumar, Sandeep
    Mittal, Gaurav
    Kumar, Sunil
    ANNALES MATHEMATICAE ET INFORMATICAE, 2024, 60 : 75 - 92
  • [9] Square, a New Multivariate Encryption Scheme
    Clough, Crystal
    Baena, John
    Ding, Jintai
    Yang, Bo-Yin
    Chen, Ming-shing
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 252 - +
  • [10] Partition ciphering system: A difficult problem based encryption scheme
    Ziani F.E.
    Fouzia O.
    International Journal of Advanced Computer Science and Applications, 2019, 10 (11): : 286 - 291