An efficient RSA public key encryption scheme

被引:14
|
作者
Aboud, Sattar J. [1 ]
AL-Fayoumi, Mohammad A. [1 ]
Al-Fayoumi, Mustafa [2 ]
Jabbar, Haidar S. [3 ]
机构
[1] Middle E Tech Univ, Grad Stud Fac IT, Amman, Jordan
[2] Anglia Ruskin Univ, Fac Sci & Technol, Cambridge, England
[3] Anna Univ, Dept Comp Sci & Engn, Madras 600025, Tamil Nadu, India
关键词
RSA public encryption scheme; square matrices; general linear group; digital signature scheme;
D O I
10.1109/ITNG.2008.199
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an efficient RSA public key encryption scheme, which is an improved version of original RSA scheme. The proposed RSA encryption scheme is based on linear group over the ring of integer mod a composite modulus n which is the product of two distinct prime numbers. In the proposed scheme the original message and the encrypted message are h x h square matrices with entities in z(n) indicated via l(h,z(n)). Since the original RSA Scheme is a block cipher in which the original message and cipher message are integer in the interval [0,n-1] for solve integer modulus n. Therefore, in this paper, we generalize RSA encryption scheme in order to be implemented in the general linear group on the ring of integer mod n. Furthermore, the suggested encryption scheme has no restriction in encryption and decryption order and is claimed to be efficient, scalable and dynamic.
引用
收藏
页码:127 / +
页数:3
相关论文
共 50 条
  • [1] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    [J]. DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47
  • [2] An efficient incomparable public key encryption scheme
    Lee, Hyang-Sook
    Lim, Seongan
    [J]. INFORMATION SCIENCES, 2011, 181 (14) : 3066 - 3072
  • [3] An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA)
    Imam R.
    Anwer F.
    Nadeem M.
    [J]. International Journal of Information Technology, 2022, 14 (5) : 2645 - 2656
  • [4] A MODIFICATION OF THE RSA PUBLIC-KEY ENCRYPTION PROCEDURE
    WILLIAMS, HC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1980, 26 (06) : 726 - 729
  • [5] PROOF CHECKING THE RSA PUBLIC KEY ENCRYPTION ALGORITHM
    BOYER, RS
    MOORE, JS
    [J]. AMERICAN MATHEMATICAL MONTHLY, 1984, 91 (03): : 181 - 189
  • [6] RSA-Based Certificateless Public Key Encryption
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 24 - +
  • [7] A database record encryption scheme using the RSA public key cryptosystem and its master keys
    Chang, CC
    Chan, CW
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 345 - 348
  • [8] An Efficient Multi-Bit Quantum Public Key Encryption Scheme
    Zheng, Shi-Hui
    Wen, Kai
    Gu, Li-Ze
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (04): : 38 - 42
  • [9] Dynamic and efficient joint encryption scheme in the plain public key model
    Shao, Zuhua
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 189 - 196
  • [10] An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal
    Yang, Ningbin
    Xu, Shumei
    Quan, Zhou
    [J]. IEEE ACCESS, 2020, 8 (77940-77950): : 77940 - 77950