A Public Key Encryption Scheme Based on Compressed Sensing

被引:0
|
作者
Zhen, Liu [1 ]
机构
[1] Engn Univ Armed Police Force, Elect Dept, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
component; data collection security; encryption algorithm; compressed sensing; LWE hypothesis; quantum attack resistant;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In order to improve the security of Compressed Sensing, this paper put forward a new idea-Compressed Sensing Public Key Encryption (CSPKE), realized a concrete CSPKE algorithm by combing Lattice-based Cryptography with Compressed Sensing, and proved its security of indistinguishability against chosen plaintext attack (IND-CPA) on standard model based on Learning With Error (LWE) assumptions. By using the matrix characteristics of LWE, this algorithm preserved the linear structure of CS. Efficiency analysis shows that it has acceptable increment on cost comparing to CS. It can be used in many fields, such as protecting security of data acquisition process based on CS.
引用
收藏
页码:20 / 24
页数:5
相关论文
共 50 条
  • [1] Public Key Image Encryption Based on Compressed Sensing
    Xie, Dong
    IEEE ACCESS, 2019, 7 : 131672 - 131680
  • [2] Public key encryption scheme based on the ergodic matrices
    Pei, Shi-Hui
    Zhao, Yong-Zhe
    Zhao, Hong-Wei
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (08): : 1908 - 1913
  • [3] On the security of a Williams based public key encryption scheme
    Mülller, S
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 1 - 18
  • [4] Public key searchable encryption scheme based on blockchain
    Du R.
    Tan A.
    Tian J.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (04): : 114 - 122
  • [5] A Public Key Encryption Scheme Based on Idempotent Semirings
    Durcheva, Mariana
    Rachev, Martin
    41ST INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'15), 2015, 1690
  • [6] On Public-key Encryption Scheme Based on Chebyshev Maps
    Zhang, Linhua
    Mao, Xiuli
    Duan, Wanyu
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1110 - 1114
  • [7] Security on public key encryption scheme based on ergodic matrices
    School of Computer Engineering, Jiangsu University of Technology, Changzhou
    Jiangsu
    213001, China
    不详
    Anhui
    230027, China
    不详
    Jiangsu
    210003, China
    Tien Tzu Hsueh Pao, 10 (2081-2085):
  • [8] A public key encryption scheme based on the polynomial reconstruction problem
    Augot, D
    Finiasz, M
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 229 - 240
  • [9] A public key encryption scheme based on factoring and discrete logarithm
    Poulakis, Dimitrios
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2009, 12 (06): : 745 - 752
  • [10] An image encryption scheme based on block compressed sensing and Chen's system
    Luo, Yuling
    Liang, Yuting
    Zhang, Shunsheng
    Liu, Junxiu
    Wang, Fangxiao
    NONLINEAR DYNAMICS, 2023, 111 (07) : 6791 - 6811