Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment

被引:1
作者
Jing, Zhengjun [1 ]
Gu, Chunsheng [1 ]
Ge, Chunpeng [1 ]
Shi, Peizhong [1 ]
机构
[1] Jiangsu Univ Technol, Sch Comp Engn, 1801 Zhong Wu Rd, Changzhou, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Public-key cryptosystem; Signature scheme; Data complexity; Quantum algorithm; Discrete logarithm; Integer factorization; ENCRYPTION;
D O I
10.1007/s11036-019-01498-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Shor presented a quantum algorithm to factor large integers and compute discrete logarithms in polynomial time. As a result, public key cryptosystems, such as RSA, ElGamal and ECC, which are based on these computational assumptions will become insecure with the advent of quantum computers. To construct a secure anti-quantum public-key cryptosystem, Wu et al. introduced the notion of data complexity under quantum environment. Based on the hardness of NP-complete problems and data complexity, they presented a new public key cryptosystem and a signature scheme. Using Shor's quantum algorithm, we break their public key cryptosystem and signature scheme by directly solving the private key from the public key. Therefore, their public key cryptosystem and signature scheme are insecure in a quantum computer.
引用
收藏
页码:1609 / 1615
页数:7
相关论文
共 26 条
[1]  
Bennett CH, 1996, PHYS REV A, V54, P3824, DOI 10.1103/PhysRevA.54.3824
[2]  
Buchmann Johannes A., 2016, The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. LNCS 9100, P88, DOI 10.1007/978-3-662-49301-4_6
[3]   Verifiable Computation over Large Database with Incremental Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Weng, Jian ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :3184-3195
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[6]  
Goldwasser S., 2008, LECT NOTES CRYPTOGRA
[7]   Asymmetric encryption and signature method with DNA technology [J].
Lai XueJia ;
Lu MingXin ;
Qin Lei ;
Han JunSong ;
Fang XiWen .
SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) :506-514
[8]   Multi-authority fine-grained access control with accountability and its application in cloud [J].
Li, Jin ;
Chen, Xiaofeng ;
Chow, Sherman S. M. ;
Huang, Qiong ;
Wong, Duncan S. ;
Liu, Zheli .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 112 :89-96
[9]  
LIU Z, 2019, IEEE T KNOWL DATA EN
[10]   DivORAM: Towards a practical oblivious RAM with variable block size [J].
Liu, Zheli ;
Huang, Yanyu ;
Li, Jin ;
Cheng, Xiaochun ;
Shen, Chao .
INFORMATION SCIENCES, 2018, 447 :1-11