A Provably Secure Public Key Encryption Scheme Based on Isogeny Star

被引:0
|
作者
Han, Weiwei [1 ]
机构
[1] Guangdong Univ Finance & Econ, Sch Math & Stat, Guangzhou, Guangdong, Peoples R China
关键词
PKE; isogeny; quantum computer; elliptic curve;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Public Key Encryption (PKE) scheme based on isogeny star has been proposed to be against the attack of the quantum computer for several years. But, there is no report about provable security PKE scheme based on isogeny star. In this paper, we propose a PKE scheme based on isogeny star and prove the security of the scheme in the random oracle.
引用
收藏
页码:623 / 627
页数:5
相关论文
共 50 条
  • [1] An efficient and provably secure public key encryption scheme based on coding theory
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Xiaohui
    Shen, Xuemin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (12) : 1440 - 1447
  • [2] Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX
    Liu, Yongzhi
    Qin, Guiyun
    Liu, Pengtao
    Hu, Chengyu
    Guo, Shanqing
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2709 - 2724
  • [3] A provably secure certificateless public key encryption with keyword search
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, King-Hang
    Meng, Chao
    Wang, Eric Ke
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 20 - 28
  • [4] Provably secure timed-release public key encryption
    Cheon, Jung Hee
    Hopper, Nicholas
    Kim, Yongdae
    Osipkov, Ivan
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (02)
  • [5] An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems
    Guo, Rui
    Wen, Qiaoyan
    Shi, Huixian
    Jin, Zhengping
    Zhang, Hua
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
  • [6] An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems
    Rui Guo
    Qiaoyan Wen
    Huixian Shi
    Zhengping Jin
    Hua Zhang
    [J]. Journal of Medical Systems, 2013, 37
  • [7] A brief history of provably-secure public-key encryption
    Dent, Alexander W.
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 357 - 370
  • [8] An Efficient and Provably Secure Certificate-Based Encryption Scheme
    Lu, Yang
    [J]. THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 54 - 61
  • [9] Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
    Gaurav Pareek
    B R Purushothama
    [J]. Sādhanā, 2018, 43
  • [10] Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
    Pareek, Gaurav
    Purushothama, B. R.
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2018, 43 (09):