Analysis of public-key cryptography using a 3-regular graph with a perfect dominating set

被引:1
|
作者
Kwon, Sujin [1 ]
Kang, Ju-Sung [2 ]
Yeom, Yongjin [2 ]
机构
[1] Kookmin Univ, Dept Financial Informat Secur, Seoul, South Korea
[2] Kookmin Univ, Dept Informat Secur Cryptol & Math, Financial Informat Secur, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
public-key cryptography; 3-regular graph; NP-complete; perfect dominating set; minus dominating function;
D O I
10.1109/TENSYMP52854.2021.9550868
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Research on post-quantum cryptography (PQC) to improve the security against quantum computers has been actively conducted. In 2020, NIST announced the final PQC candidates whose design rationales rely on NP-hard or NP-complete problems. It is believed that cryptography based on NP-hard problem might be secure against attacks using quantum computers. N. Koblitz introduced the concept of public-key cryptography using a 3-regular graph with a perfect dominating set in the 1990s. The proposed cryptosystem is based on NP-complete problem to find a perfect dominating set in the given graph. Later, S. Yoon proposed a variant scheme using a perfect minus dominating function. However, their works have not received much attention since these schemes produce huge ciphertexts and are hard to implement efficiently. Also, the security parameters such as key size and plaintext-ciphertext size have not been proposed yet. We conduct security and performance analysis of their schemes and discuss the practical range of security parameters. As an application, the scheme with one-wayness property can be used as an encoding method in the white-box cryptography (WBC).
引用
收藏
页数:6
相关论文
共 39 条
  • [21] A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    Wang, Fengjiao
    Zhang, Yuqing
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 809 - 814
  • [22] An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography
    Ming Luo
    Hong Zhao
    Wireless Personal Communications, 2015, 81 : 779 - 798
  • [23] An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography
    Luo, Ming
    Zhao, Hong
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (02) : 779 - 798
  • [24] Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
    Benhamouda, Fabrice
    Chevalier, Celine
    Thillard, Adrian
    Vergnaud, Damien
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 36 - 66
  • [25] Establishing Symmetric Pairwise-keys Using Public-Key Cryptography in Wireless Sensor Networks (WSN)
    Nadir, Ibrahim
    Zegeye, Wondimu K.
    Moazzami, Farzad
    Astatke, Yacob
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [26] Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)
    Sarkar, Arindam
    Mandal, J. K.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (10) : 137 - 145
  • [27] Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller
    Gouvea, Conrado P. L.
    Oliveira, Leonardo B.
    Lopez, Julio
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (01) : 19 - 29
  • [28] Algorithm-Based Countermeasures against Power Analysis Attacks for Public-key Cryptography SM2
    Han, Xiaowei
    Wang, Beibei
    Wang, An
    Wu, Liji
    Rhee, Woogeun
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 435 - 439
  • [29] Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller
    Conrado P. L. Gouvêa
    Leonardo B. Oliveira
    Julio López
    Journal of Cryptographic Engineering, 2012, 2 (1) : 19 - 29
  • [30] VLSI design exchange with intellectual property protection in FPGA environment using both secret and public-key cryptography
    Adi, Wael
    Ernst, Rolf
    Soudan, Bassel
    Hanoun, Abdulrahman
    IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: EMERGING VLSI TECHNOLOGIES AND ARCHITECTURES, 2006, : 24 - +