Probabilistic encryption key exchange

被引:0
|
作者
Moreau, T
机构
[1] CONNOTECH Experts-conseils Inc., Qc, H2M 2A1, 9130 Place de Montgolfier, Montreal
关键词
cryptography; information theory; public key cryptography;
D O I
10.1049/el:19951499
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A novel secret key exchange algorithm is proposed. II is based on the proprties of the Blum Blum and Shum pseudo-random number generator (the x(2) mod N' generator), and on partial disclosure of the secret seed for this generator. The security and other features of the proposed cryptosystem are discussed.
引用
收藏
页码:2166 / 2168
页数:3
相关论文
共 50 条
  • [1] Probabilistic Public Key Encryption with Equality Test
    Yang, Guomin
    Tan, Chik How
    Huang, Qiong
    Wong, Duncan S.
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 119 - +
  • [2] Integration of Signature Encryption and Key Exchange
    Ding Yong
    Li Ya-hui
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 862 - +
  • [3] Deniable Encryption Protocols Based on Probabilistic Public-Key Encryption
    Moldovyan, Nikolay
    Berezin, Andrey
    Kornienko, Anatoly
    Moldovyan, Alexander
    [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 284 - 289
  • [4] Broadcast Encryption Using Probabilistic Key Distribution and Applications
    Ramkumar, Mahalingam
    [J]. JOURNAL OF COMPUTERS, 2006, 1 (03) : 1 - 12
  • [5] Key Exchange Algorithm Based on Homomorphic Encryption
    Krendelev, Sergei
    Kuzmin, Ilya
    [J]. PROCEEDINGS OF THE 2017 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2017, : 793 - 795
  • [6] The Key Exchange Algorithm in Network Encryption Machine
    Li, Minghao
    Ding, Qun
    [J]. INTELLIGENT DATA ANALYSIS AND APPLICATIONS, (ECC 2016), 2017, 535 : 219 - 226
  • [7] Timed encryption with application to deniable key exchange
    Jiang, Shaoquan
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 560 : 172 - 189
  • [8] Ratcheted Encryption and Key Exchange: The Security of Messaging
    Bellare, Mihir
    Singh, Asha Camper
    Jaeger, Joseph
    Nyayapati, Maya
    Stepanovs, Igors
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 619 - 650
  • [9] Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases
    Wang, Yujue
    Pang, HweeHwa
    [J]. COMPUTER JOURNAL, 2017, 60 (04): : 600 - 612
  • [10] Characterization of Security Notions for Probabilistic Private-Key Encryption
    Jonathan Katz
    Moti Yung
    [J]. Journal of Cryptology, 2006, 19 : 67 - 95