Analysis of public-key cryptography using a 3-regular graph with a perfect dominating set

被引:1
|
作者
Kwon, Sujin [1 ]
Kang, Ju-Sung [2 ]
Yeom, Yongjin [2 ]
机构
[1] Kookmin Univ, Dept Financial Informat Secur, Seoul, South Korea
[2] Kookmin Univ, Dept Informat Secur Cryptol & Math, Financial Informat Secur, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
public-key cryptography; 3-regular graph; NP-complete; perfect dominating set; minus dominating function;
D O I
10.1109/TENSYMP52854.2021.9550868
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Research on post-quantum cryptography (PQC) to improve the security against quantum computers has been actively conducted. In 2020, NIST announced the final PQC candidates whose design rationales rely on NP-hard or NP-complete problems. It is believed that cryptography based on NP-hard problem might be secure against attacks using quantum computers. N. Koblitz introduced the concept of public-key cryptography using a 3-regular graph with a perfect dominating set in the 1990s. The proposed cryptosystem is based on NP-complete problem to find a perfect dominating set in the given graph. Later, S. Yoon proposed a variant scheme using a perfect minus dominating function. However, their works have not received much attention since these schemes produce huge ciphertexts and are hard to implement efficiently. Also, the security parameters such as key size and plaintext-ciphertext size have not been proposed yet. We conduct security and performance analysis of their schemes and discuss the practical range of security parameters. As an application, the scheme with one-wayness property can be used as an encoding method in the white-box cryptography (WBC).
引用
收藏
页数:6
相关论文
共 39 条
  • [1] IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph
    Ryu, Jieun
    Kim, Yongbhin
    Yoon, Seungtai
    Kang, Ju-Sung
    Yeom, Yongjin
    IEEE ACCESS, 2024, 12 : 4575 - 4596
  • [2] PASSWORD AUTHENTICATION USING PUBLIC-KEY CRYPTOGRAPHY
    HARN, L
    HUANG, D
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1989, 18 (12) : 1001 - 1017
  • [3] Secure fingerprinting using public-key cryptography
    Yoshiura, H
    Sasaki, R
    Takaragi, K
    SECURITY PROTOCOLS, 1999, 1550 : 83 - 94
  • [4] Public-key cryptography using paraunitary matrices
    Delgosha, Farshid
    Fekri, Faramarz
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (09) : 3489 - 3504
  • [5] Using probabilistic argumentation for key validation in public-key cryptography
    Haenni, R
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2005, 38 (03) : 355 - 376
  • [6] A Software Watermarking Method Based on Public-Key Cryptography and Graph Coloring
    Jiang, Zetao
    Zhong, Rubing
    Zheng, Bina
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 433 - 437
  • [7] Maximum genus and maximum nonseparating independent set of a 3-regular graph
    Huang, YQ
    Liu, YP
    DISCRETE MATHEMATICS, 1997, 176 (1-3) : 149 - 158
  • [8] Traitor tracing using identity based public-key cryptography
    National Key Laboratory of ISN, Xidian University, Xi'an 710071, China
    不详
    Chin J Electron, 2006, 4 (687-691):
  • [9] Traitor tracing using identity based public-key cryptography
    Lv Xixiang
    Yang Bo
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04): : 687 - 691
  • [10] Energy analysis of public-key cryptography for wireless sensor networks
    Wander, AS
    Gura, N
    Eberle, H
    Gupta, V
    Shantz, SC
    Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 324 - 328