QTRU: Quaternionic Version of the NTRU Public-Key Cryptosystems

被引:0
|
作者
Malekian, Ehsan [1 ]
Zakerolhosseini, Ali [1 ]
Mashatan, Atefeh [2 ]
机构
[1] Shahid Beheshti Univ, Fac Elect & Comp Engn, Tehran, Iran
[2] Ecole Polytech Fed Lausanne, Secur & Cryptog Lab, CH-1015 Lausanne, Switzerland
关键词
QTRU; NTRU; Quaternion Algebra; Public-Key Cryptography; Encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not. fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent security on the intractability of finding the shortest vector in a certain non-convolutional modular lattice, yet it is efficient and cost effective, contrary to cryptosystems such as RSA or ECC. The detailed specification of the proposed cryptosystem, including the underhung algebraic structure, key generation, encryption and decryption process and also the issues regarding key security, message security, and probability of successful decryption are explained. We will further show, based on the existing results for lattice-reduction algorithms, that the proposed cryptosystem with a dimension of 41 will have a security equal to NTRU-167. (C) 2011 ISC. All rights reserved.
引用
收藏
页码:29 / 42
页数:14
相关论文
共 50 条
  • [1] Novel public-key cryptosystems based on NTRU and algebraic structure of group rings
    Mittal, Gaurav
    Kumar, Sandeep
    Kumar, Sunil
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2021, 42 (07): : 1507 - 1521
  • [2] Coalition public-key cryptosystems
    Anisimov A.V.
    Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12
  • [3] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [4] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [5] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154
  • [6] Public-Key Cryptosystems Resilient to Key Leakage
    Naor, Moni
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 18 - 35
  • [7] PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE
    Naor, Moni
    Segev, Gil
    SIAM JOURNAL ON COMPUTING, 2012, 41 (04) : 772 - 814
  • [8] Key Distribution for Heterogeneous Public-Key Cryptosystems
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (05) : 464 - 468
  • [9] ATTACKING RSA PUBLIC-KEY CRYPTOSYSTEMS
    HAWKER, P
    ELECTRONICS WORLD & WIRELESS WORLD, 1990, 96 (1655): : 826 - 827
  • [10] THE USE OF FRACTIONS IN PUBLIC-KEY CRYPTOSYSTEMS
    ISSELHORST, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 47 - 55