Public key encryption and digital signatures based on permutation polynomials

被引:72
作者
Schwenk, J [1 ]
Huber, K [1 ]
机构
[1] Deutsch Telekom AG, Technol Zentrum, D-64295 Darmstadt, Germany
关键词
D O I
10.1049/el:19980569
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Permutation polynomials over Z(n) form the basis of the RSA and Dickson public key schemes. Previously, however, only those permutation polynomials whose inverse permutation polynomial was easy to evaluate have been used in cryptography. The authors propose a way to avoid this restriction in public key cryptography by implementing secret key decryption and signature generation by computation of the gcd of two polynomials. This allows the implementation of new classes of public key scheme.
引用
收藏
页码:759 / 760
页数:2
相关论文
共 16 条
[1]  
Blakely G. R., 1979, Computers & Mathematics with Applications, V5, P169, DOI 10.1016/0898-1221(79)90039-7
[2]  
DENNING DE, 1984, COMMUN ACM, V27, P55
[3]  
FRIED M, 1970, MICH MATH J, V17, P41
[4]  
HARDY GH, 1990, INTRO THEORY NUMBERS, P98
[5]  
Lidl R., 1983, ENCY MATH APPL, V20
[6]  
Lidl R, 1993, DICKSON POLYNOMIALS
[7]  
MOORE JH, 1992, CONT CRYPTOGRAPHY
[8]  
Nobauer R., 1988, Mathematica Slovaca, V38, P309
[9]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[10]  
RIVEST RL, 1978, CRYPTOLOGIA, V2, P62