A Public Key Encryption Scheme Based on Compressed Sensing

被引:0
作者
Zhen, Liu [1 ]
机构
[1] Engn Univ Armed Police Force, Elect Dept, Xian, Shaanxi, Peoples R China
来源
2017 9TH INTERNATIONAL CONFERENCE ON ADVANCED INFOCOMM TECHNOLOGY (ICAIT 2017) | 2017年
基金
中国国家自然科学基金;
关键词
component; data collection security; encryption algorithm; compressed sensing; LWE hypothesis; quantum attack resistant;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In order to improve the security of Compressed Sensing, this paper put forward a new idea-Compressed Sensing Public Key Encryption (CSPKE), realized a concrete CSPKE algorithm by combing Lattice-based Cryptography with Compressed Sensing, and proved its security of indistinguishability against chosen plaintext attack (IND-CPA) on standard model based on Learning With Error (LWE) assumptions. By using the matrix characteristics of LWE, this algorithm preserved the linear structure of CS. Efficiency analysis shows that it has acceptable increment on cost comparing to CS. It can be used in many fields, such as protecting security of data acquisition process based on CS.
引用
收藏
页码:20 / 24
页数:5
相关论文
共 25 条
[11]   Compressed Sensing over Finite Fields [J].
Draper, Stark C. ;
Malekpour, Sheida .
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, :669-673
[12]   Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things [J].
Li, Shancang ;
Xu, Li Da ;
Wang, Xinheng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (04) :2177-2186
[13]  
Lindner R, 2011, LECT NOTES COMPUT SC, V6558, P319, DOI 10.1007/978-3-642-19074-2_21
[14]  
Micciancio D, 2013, LECT NOTES COMPUT SC, V8042, P21, DOI 10.1007/978-3-642-40041-4_2
[15]  
Micciancio D, 2012, LECT NOTES COMPUT SC, V7237, P700, DOI 10.1007/978-3-642-29011-4_41
[16]  
ORSDEMIR A, 2008, MIL COMM C 2008 MILC, P1, DOI DOI 10.1109/MILCOM.2008.4753187
[17]   Lattice cryptography for the internet [J].
Peikert, Chris .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 :197-219
[18]  
Peikert C, 2010, LECT NOTES COMPUT SC, V6223, P80, DOI 10.1007/978-3-642-14623-7_5
[19]   The Learning with Errors Problem [J].
Regev, Oded .
25TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY - CCC 2010, 2010, :191-204
[20]   On Lattices, Learning with Errors, Random Linear Codes, and Cryptography [J].
Regev, Oded .
JOURNAL OF THE ACM, 2009, 56 (06)