A new product-sum public-key cryptosystem using message extension

被引:0
|
作者
Katayanagi, K [1 ]
Murakami, Y
Kasahara, M
机构
[1] Kyoto Inst Technol, Dept Elect & Informat Sci, Fac Engn & Design, Kyoto 6068585, Japan
[2] Murata Machinery Co Ltd, Forum Adv Informat Technol, Kyoto 6008233, Japan
[3] Osaka Gakuin Univ, Dept Fac Informat, Suita, Osaka 5648511, Japan
关键词
product-sum public-key cryptosystem; the Chinese remainder theorem; low-density attack; high density; message extension;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Kasahara and Murakami proposed new product-sum public-key cryptosystems using the Chinese remainder theorem as the trapdoor. We proposed 'Yaezakura' as the high-density product-sum PKC applying the method using the reduced bases. In this paper, we propose another high-density scheme with the Chinese remainder theorem trapdoor using the message extension. We also show that the proposed scheme is invulnerable to the low-density attack. In the proposed scheme, the sender can freely select the positions of the dummy messages.
引用
收藏
页码:2482 / 2487
页数:6
相关论文
共 50 条
  • [21] NEW TRAPDOOR-KNAPSACK PUBLIC-KEY CRYPTOSYSTEM
    GOODMAN, RMF
    ENG, C
    MCAULEY, AJ
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1985, 132 (06): : 289 - 292
  • [22] A New Public-Key Cryptosystem via Mersenne Numbers
    Aggarwal, Divesh
    Joux, Antoine
    Prakash, Anupam
    Santha, Miklos
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 : 459 - 482
  • [23] New VLSI architectures of RSA public-key cryptosystem
    Wang, PA
    Tsai, WC
    Shung, GB
    ISCAS '97 - PROCEEDINGS OF 1997 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I - IV: CIRCUITS AND SYSTEMS IN THE INFORMATION AGE, 1997, : 2040 - 2043
  • [24] Equivalent key attack against a public-key cryptosystem based on subset sum problem
    Liu, Jiayang
    Bi, Jingguo
    IET INFORMATION SECURITY, 2018, 12 (06) : 498 - 501
  • [25] New Lattice-based Public-key Cryptosystem
    Jiang, Yali
    Ju, Xiuling
    Shi, Feng
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 387 - 389
  • [26] A New Trapdoor in Knaspsack Public-Key Cryptosystem with Two Sequences as the Public Key
    Murakami, Yasuyuki
    Nasako, Takeshi
    Kasahara, Masao
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 357 - +
  • [27] A Public-Key Cryptosystem Using Purely Cubic Fields
    R. Scheidler
    Journal of Cryptology, 1998, 11 : 109 - 124
  • [28] A Note on Security of Public-Key Cryptosystem Provably as Secure as Subset Sum Problem
    Hamasho, Shinsuke
    Murakami, Yasuyuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01) : 298 - 299
  • [29] PIEPRZYK PUBLIC-KEY CRYPTOSYSTEM IS INSECURE
    YANG, YX
    ELECTRONICS LETTERS, 1987, 23 (20) : 1043 - 1044
  • [30] A generalization of the ElGamal public-key cryptosystem
    Ranasinghe, Rajitha
    Athukorala, Pabasara
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2395 - 2403