Public key cryptosystems based on boolean permutations and their applications

被引:6
作者
Wu, CK [1 ]
Varadharajan, V [1 ]
机构
[1] Univ Western Sydney Nepean, Sch Comp & Informat Technol, Kingswood, NSW 2747, Australia
关键词
public key cryptography; Boolean permutation; digital signatures;
D O I
10.1080/00207160008804932
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper we propose the use of Boolean permutations to design public key cryptosystems. The security of the cryptosystems is based on the difficulty of inverting Boolean permutations. Using two Boolean permutations for which the inverses are easy to find, one can construct a composite Boolean permutation which is hard to invert. The paper proposes three such Boolean permutation based public key systems. The paper also consider applications of a Boolean permutation based public key system to digital signatures and shared signatures.
引用
收藏
页码:167 / 184
页数:18
相关论文
共 24 条
[1]  
Adams C., 1990, Journal of Cryptology, V3, P27, DOI 10.1007/BF00203967
[2]  
BELLARE M, 1997, P 4 ACM C COMP COMM
[3]  
Caelli WJ, 1996, LECT NOTES COMPUT SC, V1029, P40, DOI 10.1007/BFb0032345
[4]   KEY ESCROWING TODAY [J].
DENNING, DE ;
SMID, M .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) :58-68
[5]   A taxonomy for key escrow encryption systems [J].
Denning, DE ;
Branstad, DK .
COMMUNICATIONS OF THE ACM, 1996, 39 (03) :34-39
[6]  
DESMEDT Y, 1995, LNCS, V921, P147
[7]  
DESMEDT Y, 1993, LECT NOTES COMPUTER, V718, P3
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
Frankel Y, 1995, LECT NOTES COMPUT SC, V963, P222
[10]  
Ganesan R, 1996, COMMUN ACM, V39, P33