A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE

被引:0
|
作者
Jiang Zhengtao Hao Yanhua Wang Yumin (National Key Lab of Integrated Service Networks
机构
基金
中国国家自然科学基金;
关键词
Probabilistic public-key encryption scheme; LUCas sequence(LUC); Discrete logarithm; Integer factorization;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed.
引用
收藏
页码:490 / 497
页数:8
相关论文
共 50 条
  • [41] A New High-Performance Public-Key Encryption Scheme Using Two Algebras
    Al-Bairmani, Sukaina Abdullah
    Hani, Najwan Noori
    Yassein, Hassan Rashed
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2024, 20 (01): : 435 - 438
  • [42] CSP-DHIES: a new public-key encryption scheme from matrix conjugation
    Pan, Ping
    Wang, Lihua
    Wang, Licheng
    Li, Lixiang
    Yang, Yixian
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (07) : 809 - 822
  • [43] New Signcryption Scheme based on Multivariate Public-key Cryptosystem
    Han Yiliang
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONIC, INDUSTRIAL AND CONTROL ENGINEERING, 2015, 8 : 227 - 230
  • [44] CASE: A New Frontier in Public-Key Authenticated Encryption
    Agrawal, Shashank
    Agrawal, Shweta
    Prabhakaran, Manoj
    Raghunath, Rajeev
    Singla, Jayesh
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 189 - 219
  • [45] Functional Encryption: A New Vision for Public-Key Cryptography
    Boneh, Dan
    Sahai, Amit
    Waters, Brent
    COMMUNICATIONS OF THE ACM, 2012, 55 (11) : 56 - 64
  • [46] Security analysis of public-key encryption scheme based on neural networks and its implementing
    Liu, Niansheng
    Guo, Donghui
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 443 - +
  • [47] Security analysis of public-key encryption scheme based on neural networks and its implementing
    Liu, Niansheng
    Guo, Donghui
    Int. Conf. Comput. Intell. Secur. ICCIAS, 2006, (1327-1330):
  • [48] Security analysis of public-key encryption scheme based on neural networks and its implementing
    Liu, Niansheng
    Guo, Donghui
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1327 - 1330
  • [49] New security notions and relations for public-key encryption
    Sepahi, Reza
    Pieprzyk, Josef
    Shahandashti, Siamak F.
    Schoenmakers, Berry
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2012, 6 (3-4) : 183 - 227
  • [50] Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information
    Xin, Xiangjun
    Yang, Qinglan
    Li, Fagen
    QUANTUM INFORMATION PROCESSING, 2020, 19 (08)