A Public Key Encryption Scheme Based on Compressed Sensing

被引:0
|
作者
Zhen, Liu [1 ]
机构
[1] Engn Univ Armed Police Force, Elect Dept, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
component; data collection security; encryption algorithm; compressed sensing; LWE hypothesis; quantum attack resistant;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In order to improve the security of Compressed Sensing, this paper put forward a new idea-Compressed Sensing Public Key Encryption (CSPKE), realized a concrete CSPKE algorithm by combing Lattice-based Cryptography with Compressed Sensing, and proved its security of indistinguishability against chosen plaintext attack (IND-CPA) on standard model based on Learning With Error (LWE) assumptions. By using the matrix characteristics of LWE, this algorithm preserved the linear structure of CS. Efficiency analysis shows that it has acceptable increment on cost comparing to CS. It can be used in many fields, such as protecting security of data acquisition process based on CS.
引用
收藏
页码:20 / 24
页数:5
相关论文
共 50 条
  • [21] An efficient incomparable public key encryption scheme
    Lee, Hyang-Sook
    Lim, Seongan
    INFORMATION SCIENCES, 2011, 181 (14) : 3066 - 3072
  • [22] Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem
    Duan, Gangqiang
    Li, Shuai
    ELECTRONICS, 2023, 12 (18)
  • [23] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47
  • [24] A New Public Key Encryption Scheme based on Layered Cellular Automata
    Zhang, Xing
    Lu, Rongxing
    Zhang, Hong
    Xu, Chungen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (10): : 3572 - 3590
  • [25] Efficient certificate-based public-key encryption scheme
    Information Security and National Grid Computing Laboratory, Southwest Jiaotong University, Chengdu 610031, China
    Tien Tzu Hsueh Pao, 2008, 10 (2055-2059): : 2055 - 2059
  • [26] An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA)
    Imam R.
    Anwer F.
    Nadeem M.
    International Journal of Information Technology, 2022, 14 (5) : 2645 - 2656
  • [27] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin (National Key Lab of Integrated Service Networks
    Journal of Electronics(China), 2005, (05) : 490 - 497
  • [28] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin National Key Lab of Integrated Service Networks Xidian Univ Xian China
    Journal of Electronics, 2005, (05) : 490 - 497
  • [29] A Provably Secure Public Key Encryption Scheme Based on Isogeny Star
    Han, Weiwei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (06) : 623 - 627
  • [30] Design and implementation of a chaos-based public key encryption scheme
    Wang, XB
    Zhang, LH
    Wu, Y
    PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 79 - 82