A New Secure Encryption Scheme Based on Group Factorization Problem

被引:2
|
作者
Cong, Yue [1 ]
Hong, Haibo [2 ]
Shao, Jun [2 ]
Han, Song [2 ]
Lin, Jianhong [3 ]
Zhao, Shuai [2 ,4 ]
机构
[1] Zhejiang Agr Business Coll, Shaoxing 312088, Peoples R China
[2] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
[3] Zhejiang Ponshine Informat Technol Co, Hangzhou 310000, Peoples R China
[4] Zhejiang Gongshang Univ, Comp Ctr, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption scheme; group factorization problem; logarithmic signatures; random covers; PUBLIC-KEY CRYPTOSYSTEM; CRYPTANALYSIS; MATRICES; ALGORITHMS;
D O I
10.1109/ACCESS.2019.2954672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As special types of factorization of finite groups, logarithmic signatures and covers have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, MST3 and eMST(3). In particular, as a natural analogue of integer factorization problem (IFP), group factorization problem (GFP) and its hardness assumption over certain factorization basis, referred as logarithmic signature, play a core role in the security arguments for the family of MST cryptosystems. Security is not the unique goal of designing a cryptosystem. Instead, efficiency is also a major issue. In this paper, we design a new secure encryption scheme based on group factorization problem (GFP). Furthermore, we present the security analysis and demonstrate the performance of our scheme. Comparing with eMST3, our scheme is simplified with more efficiency.
引用
收藏
页码:168728 / 168735
页数:8
相关论文
共 50 条
  • [21] On the security of a new image encryption scheme based on a chaotic function
    Daniel Caragata
    Ion Tutanescu
    Signal, Image and Video Processing, 2014, 8 : 641 - 646
  • [22] A new image encryption scheme based on hybrid chaotic maps
    Pourjabbar Kari, Ahmad
    Habibizad Navin, Ahmad
    Bidgoli, Amir Massoud
    Mirnia, Mirkamal
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 2753 - 2772
  • [23] Generalized multi-channel scheme for secure image encryption
    Audhkhasi, Romil
    Povinelli, Michelle L.
    SCIENTIFIC REPORTS, 2021, 11 (01)
  • [24] Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system
    Khan, Majid
    Masood, Fawad
    Alghafis, Abdullah
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (15) : 11837 - 11857
  • [25] Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
    Coron, JS
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 14 - 27
  • [26] A New and Secure Cryptosystem for Image Encryption and Decryption
    Rao, K. Deergha
    Kumar, K. Praveen
    Krishna, P. V. Murali
    IETE JOURNAL OF RESEARCH, 2011, 57 (02) : 165 - 171
  • [27] A probabilistic public key encryption switching scheme for secure cloud storage
    Bhat R.
    Sunitha N.R.
    Iyengar S.S.
    International Journal of Information Technology, 2023, 15 (2) : 675 - 690
  • [28] HFERP - A New Multivariate Encryption Scheme
    Ikematsu, Yasuhiko
    Perlner, Ray
    Smith-Tone, Daniel
    Takagi, Tsuyoshi
    Vates, Jeremy
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 396 - 416
  • [29] Novel secure data protection scheme using Martino homomorphic encryption
    Rupa, Ch.
    Greeshmanth
    Shah, Mohd Asif
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [30] Novel secure data protection scheme using Martino homomorphic encryption
    Ch. Rupa
    Mohd Asif Greeshmanth
    Journal of Cloud Computing, 12