A New Encryption Scheme Based on Groupring

被引:5
|
作者
Inam, Saba [1 ]
Kanwal, Shamsa [1 ]
Ali, Rashid [2 ]
机构
[1] Fatima Jinnah Women, Dept Math Sci, Fac Sci & Technol, Rawalpindi, Pakistan
[2] Capital Univ Sci & Technol, Fac Comp, Dept Math, Islamabad, Pakistan
来源
CONTEMPORARY MATHEMATICS | 2021年 / 2卷 / 02期
关键词
groupring; general linear group; key exchange protocol; public key cryptography; KEY; CRYPTOSYSTEM;
D O I
10.37256/cm.222021611
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Security of some present day public key cryptosystem (PKC) is based on general linear groups as it is a good choice for developing such types of cryptosystems. This study presents various public key encryption schemes based on general linear groups. Different techniques including automorphisms in connection with conjugacy search problem and its generalization are used to develop these schemes. Further, the grouprings are chosen as a platform to enhance the security and efficiency. Numerous aspects related to our new proposal are also elaborated.
引用
收藏
页码:103 / 112
页数:10
相关论文
共 50 条
  • [21] An image encryption scheme based on a new hyperchaotic finance system
    Tong, Xiao-Jun
    Zhang, Miao
    Wang, Zhu
    Liu, Yang
    Ma, Jing
    OPTIK, 2015, 126 (20): : 2445 - 2452
  • [22] A novel image encryption scheme based on a new hyperchaotic map
    Tarek Farah
    Badr M Alshammari
    Multimedia Tools and Applications, 2024, 83 : 34537 - 34579
  • [23] Intertwining and NCA Maps Based New Image Encryption Scheme
    Khan, Fadia Ali
    Ahmed, Jameel
    Ahmad, Jawad
    Khan, Jan Sher
    Stankovic, Vladimir
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 12 - 16
  • [24] A novel image encryption scheme based on a new hyperchaotic map
    Farah, Tarek
    Alshammari, Badr M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (12) : 34537 - 34579
  • [25] A New Secure Encryption Scheme Based on Group Factorization Problem
    Cong, Yue
    Hong, Haibo
    Shao, Jun
    Han, Song
    Lin, Jianhong
    Zhao, Shuai
    IEEE ACCESS, 2019, 7 : 168728 - 168735
  • [26] A New Efficient Request-Based Comparable Encryption Scheme
    Chen, Peng
    Ye, Jun
    Chen, Xiaofeng
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 436 - 439
  • [27] A new practical Limited identity-based encryption scheme
    Lu, Rongxing
    Cao, Zhenfu
    Dong, Xiaolei
    FUNDAMENTA INFORMATICAE, 2007, 80 (04) : 461 - 474
  • [28] A New Card Authentication Scheme Based on Image Watermarking and Encryption
    Peng, Xinxin
    Lu, Jianfeng
    Li, Li
    Chang, Chin-Chen
    Zhou, Qili
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 358 - 369
  • [29] New chaos-based encryption scheme for digital sequence
    Zhang Zhengwei
    Journal of Systems Engineering and Electronics, 2007, (04) : 698 - 703
  • [30] A New Encryption Scheme Based on DNA and Polynomials with More Security
    Albakaa, Fatimah H.
    Yassein, Hassan Rashed
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2025, 20 (01): : 383 - 386