Quaternion Public Key Cryptosystems

被引:0
|
作者
Valluri, Maheswara Rao [1 ]
Narayan, Shailendra Vikash [1 ]
机构
[1] Fiji Natl Univ, Sch Math & Comp Sci, POB 7222,Derrick Campus, Suva, Fiji
关键词
Brute force attack; key exchange; public key cryptosystem; quaternion hidden conjugacy search problem; quaternion ring; DISCRETE LOGARITHMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, quaternion key exchange protocol and quaternion public key encryption scheme are proposed. The security of proposals relies on hardness of the hidden quaternion conjugacy search problem, that is, difficulty of solving the simultaneous quaternion discrete logarithmic problem and quaternion conjugacy search problem over quaternion rings modulo prime, p. Also, the performance and the security related issues of the proposals have been discussed.
引用
收藏
页码:48 / 51
页数:4
相关论文
共 50 条
  • [41] Multivariate public key cryptosystems from diophantine equations
    Shuhong Gao
    Raymond Heindl
    Designs, Codes and Cryptography, 2013, 67 : 1 - 18
  • [42] Public key cryptosystems based on boolean permutations and their applications
    Wu, CK
    Varadharajan, V
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2000, 74 (02) : 167 - 184
  • [43] General Fault Attacks on Multivariate Public Key Cryptosystems
    Hashimoto, Yasufumi
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 196 - 205
  • [44] Public-key cryptosystems based on cubic curves
    Koyama, Kenji
    Kuwakado, Hidenori
    Tsuruoka, Yukio
    NTT R and D, 1995, 44 (10): : 91 - 98
  • [45] Multivariate public key cryptosystems from diophantine equations
    Gao, Shuhong
    Heindl, Raymond
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 67 (01) : 1 - 18
  • [46] COMPLEXITY-MEASURES FOR PUBLIC-KEY CRYPTOSYSTEMS
    GROLLMANN, J
    SELMAN, AL
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 309 - 335
  • [47] Easy verifiable primitives and practical public key cryptosystems
    Galindo, D
    Martín, S
    Morillo, P
    Villar, JL
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 69 - 83
  • [48] Extended notions of security for multicast public key cryptosystems
    Baudron, O
    Pointcheval, D
    Stern, J
    AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 499 - 511
  • [49] Montgomery modular multiplication architecture for public key cryptosystems
    McLoone, M
    McIvor, C
    McCanny, J
    2004 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS DESIGN AND IMPLEMENTATION, PROCEEDINGS, 2004, : 349 - 354
  • [50] Linearization equation attack on TTM public key cryptosystems
    Liu M.-J.
    Nie X.-Y.
    Hu L.
    Wu J.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2010, 39 (02): : 293 - 297