QTRU: Quaternionic Version of the NTRU Public-Key Cryptosystems

被引:0
|
作者
Malekian, Ehsan [1 ]
Zakerolhosseini, Ali [1 ]
Mashatan, Atefeh [2 ]
机构
[1] Shahid Beheshti Univ, Fac Elect & Comp Engn, Tehran, Iran
[2] Ecole Polytech Fed Lausanne, Secur & Cryptog Lab, CH-1015 Lausanne, Switzerland
关键词
QTRU; NTRU; Quaternion Algebra; Public-Key Cryptography; Encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not. fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent security on the intractability of finding the shortest vector in a certain non-convolutional modular lattice, yet it is efficient and cost effective, contrary to cryptosystems such as RSA or ECC. The detailed specification of the proposed cryptosystem, including the underhung algebraic structure, key generation, encryption and decryption process and also the issues regarding key security, message security, and probability of successful decryption are explained. We will further show, based on the existing results for lattice-reduction algorithms, that the proposed cryptosystem with a dimension of 41 will have a security equal to NTRU-167. (C) 2011 ISC. All rights reserved.
引用
收藏
页码:29 / 42
页数:14
相关论文
共 50 条
  • [21] On non-Abelian homomorphic public-key cryptosystems
    Grigoriev D.
    Ponomarenko I.
    Journal of Mathematical Sciences, 2005, 126 (3) : 1158 - 1166
  • [22] Optimal-resilience proactive public-key cryptosystems
    Frankel, Y
    Gemmell, P
    MacKenzie, PD
    Yung, MT
    38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 384 - 393
  • [23] High-speed algorithms for public-key cryptosystems
    Joseph, G
    Penzhorn, WT
    2004 IEEE AFRICON: 7TH AFRICON CONFERENCE IN AFRICA, VOLS 1 AND 2: TECHNOLOGY INNOVATION, 2004, : 945 - 951
  • [24] An efficient Montgomery exponentiation algorithm for public-key cryptosystems
    Wu, Chia-Long
    Lou, Der-Chyuan
    Chang, Te-Jen
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 284 - +
  • [25] Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits
    Dima Grigoriev
    Ilia Ponomarenko
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 239 - 255
  • [26] Code-Based Public-Key Cryptosystems and Their Applications
    Kobara, Kazukuni
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55
  • [27] Homomorphic public-key cryptosystems and encrypting boolean circuits
    Grigoriev, Dima
    Ponomarenko, Ilia
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 17 (3-4) : 239 - 255
  • [28] METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS
    RIVEST, RL
    SHAMIR, A
    ADLEMAN, L
    COMMUNICATIONS OF THE ACM, 1978, 21 (02) : 120 - 126
  • [29] Security and reliability of LDPC based public-key cryptosystems
    Saad, D
    Skantzos, NS
    Kabashima, Y
    PROGRESS OF THEORETICAL PHYSICS SUPPLEMENT, 2005, (157): : 229 - 236
  • [30] BREAKING A CLASS OF PUBLIC-KEY CRYPTOSYSTEMS WITH EUCLID ALGORITHM
    李大兴
    张泽增
    Science Bulletin, 1991, (10) : 873 - 876