Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security

被引:6
|
作者
Sakalauskas, Eligijus [1 ]
Mihalkovich, Aleksejus [1 ]
Venckauskas, Algimantas [2 ]
机构
[1] Kaunas Univ Technol, Dept Appl Math, Fac Math & Nat Sci, Studentu Str 50-324, LT-51368 Kaunas, Lithuania
[2] Kaunas Univ Technol, Dept Comp Sci, Fac Informat, Studentu Str 50-213, LT-51368 Kaunas, Lithuania
来源
SYMMETRY-BASEL | 2017年 / 9卷 / 01期
关键词
cryptography; asymmetric encryption; embedded systems;
D O I
10.3390/sym9010009
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The improved version of the author's previously declared asymmetric cipher protocol based on matrix power function (MPF) is presented. Proposed modification avoids discrete logarithm attack (DLA) which could be applied to the previously declared protocol. This attack allows us to transform the initial system of MPF equations to so-called matrix multivariate quadratic (MMQ) system of equations, which is a system representing a subclass of multivariate quadratic (MQ) systems of equations. We are making a conjecture that avoidance of DLA in protocol, presented here, should increase its security, since an attempt to solve the initial system of MPF equations would appear to be no less complex than solving the system of MMQ equations. No algorithms are known to solve such a system of equations. Security parameters and their secure values are defined. Security analysis against chosen plaintext attack (CPA) and chosen ciphertext attack (CCA) is presented. Measures taken to prevent DLA attack increase the security of this protocol with respect to the previously declated protocol.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
    Cogliati, Benoit
    Seurin, Yannick
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 584 - 613
  • [42] On the provable security of an efficient RSA-based Pseudorandom Generator
    Steinfeld, Ron
    Pieprzyk, Josef
    Wang, Huaxiong
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 194 - +
  • [43] Provable security of ID-based proxy signature schemes
    Gu, CX
    Zhu, YF
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
  • [44] Provable security signcryption scheme based on RLWE without trapdoor
    Liu, Zhen
    Han, Yiliang
    Yang, Xiaoyuan
    Liu, Shuguang
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (06): : 14 - 25
  • [45] An improved algorithm of stream cipher based on LFSR
    Feng, Lifeng
    Wang, Xiaofeng
    Fang, Yingjue
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [46] A Provable Security Scheme of ID-Based Threshold Decryption
    Xue-Guang, Wang
    Zhen-Chuan, Chai
    [J]. FORENSICS IN TELECOMMUNICATIONS, INFORMATION AND MULTIMEDIA, 2009, 8 : 122 - +
  • [47] A Short Certificate-based Signature Scheme with Provable Security
    Hung, Ying-Hao
    Huang, Sen-Shan
    Tseng, Yuh-Min
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 243 - 253
  • [48] On the Security of Designing a Cellular Automata Based Stream Cipher
    Maiti, Swapan
    Ghosh, Shamit
    Chowdhury, Dipanwita Roy
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 406 - 413
  • [49] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    [J]. INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [50] Block Cipher Security Evaluation Based on Fuzzy Logic
    Mohammed, Sirwan A.
    Sadkhan, Sattar B.
    [J]. 2013 FIRST INTERNATIONAL SCIENTIFIC CONFERENCE ON ELECTRICAL, COMMUNICATION, COMPUTER, POWER, AND CONTROL ENGINEERING (ICECCPCE'13), 2013, : 169 - 173