One private-key for all DL-based cryptosystems

被引:0
|
作者
Pon, SF
Lu, EH
Jeng, AB
机构
[1] Chang Gung Univ, Dept Elect Engn, Taoyuan 333, Taiwan
[2] Kao Yuan Inst Technol, Dept Informat Management, Kaohsiung 821, Taiwan
关键词
DL-based cryptosystems; weak public-key attack; same private-key attack; primarily testing;
D O I
10.1016/j.amc.2004.12.054
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
This paper proposes a method to use one single private-key for all different DL-based public-key cryptographic systems and also explores a way to introduce certain key-checking mechanism for preventing from various potential security threats including the so called "same private-key" attack method presented in this paper. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:666 / 672
页数:7
相关论文
共 50 条
  • [1] PRIVATE-KEY ALGEBRAIC-CODED CRYPTOSYSTEMS
    RAO, TRN
    NAM, KH
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 35 - 48
  • [2] Ising Spin-Based Error Correcting Private-Key Cryptosystems
    郑东
    郑燕飞
    范武英
    [J]. Journal of Shanghai Jiaotong University(Science), 2006, (02) : 215 - 218
  • [3] PRIVATE-KEY ALGEBRAIC-CODE CRYPTOSYSTEMS WITH HIGH INFORMATION RATES
    HWANG, T
    RAO, TRN
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 657 - 661
  • [4] The security of all private-key bits in isogeny-based schemes
    Shani, Barak
    [J]. DISCRETE APPLIED MATHEMATICS, 2020, 282 : 184 - 195
  • [5] PRIVATE-KEY ENCRYPTION BASED ON CONCATENATION OF CODES
    ALJABRI, AK
    ALTHUKAIR, F
    MIRZA, A
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 1994, 141 (03): : 105 - 110
  • [6] Security of private-key encryption based on array codes
    AlJabri, A
    [J]. ELECTRONICS LETTERS, 1996, 32 (24) : 2226 - 2227
  • [7] Distributed Private-Key Generators for Identity-Based Cryptography
    Kate, Aniket
    Goldberg, Ian
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 436 - 453
  • [8] ARRAY CODES FOR PRIVATE-KEY ENCRYPTION
    DESOUZA, RMC
    DESOUZA, JC
    [J]. ELECTRONICS LETTERS, 1994, 30 (17) : 1394 - 1396
  • [9] One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
    Xu, Peng
    Cui, Guo-Hua
    Lei, Feng-Yu
    Xu, Jing-Fang
    [J]. INFORMATION SCIENCES, 2010, 180 (22) : 4420 - 4429
  • [10] Private-key cryptosystem for CD and DVD
    Jiawook, RN
    [J]. MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION, 1998, 3456 : 45 - 50