New Public-Key Cryptosystem Based on Two-Dimension DLP

被引:2
|
作者
Zhang, Xiaoqiang [1 ]
Zhu, Guiliang [2 ]
Wang, Weiping [2 ]
Wang, Mengmeng [2 ]
Ma, Shilong [1 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing, Peoples R China
[2] North China Univ Water Conservancy & Elect Power, Zhengzhou, Henan, Peoples R China
关键词
asymmetric cryptosystem; discrete logarithm problem (DLP); two dimensions; RSA; ECC (elliptic curve cryptosystem);
D O I
10.4304/jcp.7.1.169-178
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The asymmetric cryptosystem plays an important role in the cryptology nowadays. It is widely used in the fields of data encryption, digital watermarking, digital signature, secure network protocol, etc. However, with the improvement of computing capability, longer and longer the key length is required to ensure the security of interaction information. To shorten the key length and improve the encryption efficiency, by defining the two-dimension discrete logarithm problem (DLP), a new public-key cryptosystem is proposed. This new cryptosystem generalizes the public-key cryptosystem from one dimension to two dimensions. The core algorithms of the proposed cryptosystem are also designed, including the fast algorithm, computing the inverse matrix modulo p and finding the period. To verify the correctness and rationality of the new cryptosystem, two examples are carried out. Meanwhile, the efficiency and security are analyzed in detail. Experimental results and theoretical analyses show that the new cryptosystem possesses the advantages of the outstanding robustness, short key length, high security and encrypting many data once.
引用
收藏
页码:169 / 178
页数:10
相关论文
共 17 条
  • [1] New probabilistic public-key encryption based on the RSA cryptosystem
    Roman'kov, Vitalii A.
    GROUPS COMPLEXITY CRYPTOLOGY, 2015, 7 (02) : 153 - 156
  • [2] A faster modular multiplication based on key size partitioning for RSA public-key cryptosystem
    Lee, SY
    Jeong, YJ
    Kwon, OJ
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2002, E85D (04) : 789 - 791
  • [3] Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm
    Zhao, Tieyu
    Ran, Qiwen
    Yuan, Lin
    Chi, Yingying
    Ma, Jing
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [4] Add-On Security Model for Public-Key Cryptosystem Based on Magic Square Implementation
    Ganapathy, Gopinanath
    Mani, K.
    WCECS 2009: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 317 - +
  • [5] An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
    Ye, Guodong
    Jiao, Kaixin
    Wu, Huishan
    Pan, Chen
    Huang, Xiaoling
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (15):
  • [6] An improved Montgomery's algorithm for high-speed RSA public-key cryptosystem
    Su, CY
    Hwang, SA
    Chen, PS
    Wu, CW
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 1999, 7 (02) : 280 - 284
  • [7] Secure and Energy Efficient Design of Multi-Modular Exponential Techniques for Public-Key Cryptosystem
    Tiwari U.
    Vollala S.
    Ramasubramanian N.
    Begum B.S.
    Lakshminarayanan G.
    Journal of Communications and Information Networks, 2022, 7 (03) : 309 - 323
  • [8] Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography
    Zhao, Tieyu
    Ran, Qiwen
    Yuan, Lin
    Chi, Yingying
    Ma, Jing
    OPTICS AND LASERS IN ENGINEERING, 2016, 83 : 48 - 58
  • [9] A Petri net based public-key cryptography: PNPKC
    Ge, QW
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (06): : 1532 - 1535
  • [10] An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map
    Tan, Tao
    Zhang, Liming
    Liu, Shuaikang
    Wang, Lei
    SECURITY AND PRIVACY, 2025, 8 (01):