Security on public key encryption scheme based on ergodic matrices

被引:0
|
作者
School of Computer Engineering, Jiangsu University of Technology, Changzhou [1 ]
Jiangsu
213001, China
不详 [2 ]
Anhui
230027, China
不详 [3 ]
Jiangsu
210003, China
机构
来源
Tien Tzu Hsueh Pao | / 10卷 / 2081-2085期
关键词
D O I
10.3969/j.issn.0372-2112.2014.10.033
中图分类号
学科分类号
摘要
For the public key encryption scheme based on the ergodic matrices constructed by Pei et al., this paper proves that breaking this scheme is not harder than solving polynomial discrete logarithm problem on finite field applying the properties of ergodic matrices and linearization method. Thus, we show that their proof of security is not correct for this public key encryption scheme. ©, 2014, Tien Tzu Hsueh Pao/Acta Electronica Sinica. All right reserved.
引用
收藏
相关论文
共 50 条
  • [1] Public key encryption scheme based on the ergodic matrices
    Pei, Shi-Hui
    Zhao, Yong-Zhe
    Zhao, Hong-Wei
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (08): : 1908 - 1913
  • [2] Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices
    Rasslan, Mohamed
    Youssef, Amr
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 853 - 854
  • [3] Construct public key encryption scheme using ergodic matrices over GF(2)
    Pei Shi-Hui
    Zhao Yong-Zhe
    Zhao Hong-Wei
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 181 - +
  • [4] Cryptanalysis on Public Key Encryption Scheme Using Ergodic Matrices over GF(2)
    Gu Chun-sheng
    Yu Zhi-ming
    Jing Zheng-jun
    Gu Jixing
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 93 - 96
  • [5] On the security of a Williams based public key encryption scheme
    Mülller, S
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 1 - 18
  • [6] Secret Key Awareness Security Public Key Encryption Scheme
    Zhang, Guoyan
    Xu, Qiuliang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2011, 5 (04): : 49 - 57
  • [7] On the Security of a Certificateless Searchable Public Key Encryption Scheme
    Wu, Tsu-Yang
    Meng, Fanya
    Chen, Chien-Ming
    Liu, Shuai
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119
  • [8] Security Analysis of Shifted Odd Knapsack Public Key Encryption Scheme
    Sakai, Ryuichi
    Murakami, Yasuyuki
    Kasahara, Masao
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 731 - 734
  • [9] Public key searchable encryption scheme based on blockchain
    Du R.
    Tan A.
    Tian J.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (04): : 114 - 122
  • [10] A Public Key Encryption Scheme Based on Idempotent Semirings
    Durcheva, Mariana
    Rachev, Martin
    41ST INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'15), 2015, 1690