A New Secure Encryption Scheme Based on Group Factorization Problem

被引:2
作者
Cong, Yue [1 ]
Hong, Haibo [2 ]
Shao, Jun [2 ]
Han, Song [2 ]
Lin, Jianhong [3 ]
Zhao, Shuai [2 ,4 ]
机构
[1] Zhejiang Agr Business Coll, Shaoxing 312088, Peoples R China
[2] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
[3] Zhejiang Ponshine Informat Technol Co, Hangzhou 310000, Peoples R China
[4] Zhejiang Gongshang Univ, Comp Ctr, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption scheme; group factorization problem; logarithmic signatures; random covers; PUBLIC-KEY CRYPTOSYSTEM; CRYPTANALYSIS; MATRICES; ALGORITHMS;
D O I
10.1109/ACCESS.2019.2954672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As special types of factorization of finite groups, logarithmic signatures and covers have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, MST3 and eMST(3). In particular, as a natural analogue of integer factorization problem (IFP), group factorization problem (GFP) and its hardness assumption over certain factorization basis, referred as logarithmic signature, play a core role in the security arguments for the family of MST cryptosystems. Security is not the unique goal of designing a cryptosystem. Instead, efficiency is also a major issue. In this paper, we design a new secure encryption scheme based on group factorization problem (GFP). Furthermore, we present the security analysis and demonstrate the performance of our scheme. Comparing with eMST3, our scheme is simplified with more efficiency.
引用
收藏
页码:168728 / 168735
页数:8
相关论文
共 50 条
  • [31] A secure and efficient group signature scheme based on multivariate public key cryptography
    Kundu, Nibedita
    Debnath, Sumit Kumar
    Mishra, Dheerendra
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [32] A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme
    Liang, Junying
    Peng, Haipeng
    Li, Lixiang
    Tong, Fenghua
    Bao, Shuang
    Wang, Lanlan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [33] New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems
    Zhu, Huijun
    Wang, Licheng
    Qiu, Shuming
    Niu, Xinxin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 764 - 785
  • [34] An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems
    Wang, Licheng
    Li, Jing
    Gu, Lize
    Yan, Jianhua
    Qu, Zhiguo
    FUNDAMENTA INFORMATICAE, 2018, 157 (1-2) : 47 - 62
  • [35] A NEW PARALLEL ENCRYPTION SCHEME FOR MASSIVE DATA
    Liu, Yang
    Lu, Songfeng
    Zhao, Youqiao
    Liu, Fang
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 343 - 346
  • [36] A new image encryption scheme based on cyclic elliptic curve and chaotic system
    Abd El-Latif, Ahmed A.
    Li, Li
    Niu, Xiamu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) : 1559 - 1584
  • [37] New rank codes based encryption scheme using partial circulant matrices
    Lau, Terry Shue Chien
    Tan, Chik How
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2979 - 2999
  • [38] A secure key authentication scheme for cryptosystems based on GDLP and IFP
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    SOFT COMPUTING, 2017, 21 (24) : 7285 - 7291
  • [39] Cryptanalysis of encryption scheme based on compound coupled logistic map and anti-codifying technique for secure data transmission
    Munir, Noor
    Khan, Majid
    Hussain, Iqtadar
    Alanazi, Ammar S.
    OPTIK, 2022, 267
  • [40] Cryptanalysis of a secure image encryption scheme based on a novel 2D sine–cosine cross‑chaotic map
    Ming Li
    Pengcheng Wang
    Yange Yue
    Yanfang Liu
    Journal of Real-Time Image Processing, 2021, 18 : 2135 - 2149