Security on public key encryption scheme based on ergodic matrices

被引:0
|
作者
School of Computer Engineering, Jiangsu University of Technology, Changzhou [1 ]
Jiangsu
213001, China
不详 [2 ]
Anhui
230027, China
不详 [3 ]
Jiangsu
210003, China
机构
来源
Tien Tzu Hsueh Pao | / 10卷 / 2081-2085期
关键词
D O I
10.3969/j.issn.0372-2112.2014.10.033
中图分类号
学科分类号
摘要
For the public key encryption scheme based on the ergodic matrices constructed by Pei et al., this paper proves that breaking this scheme is not harder than solving polynomial discrete logarithm problem on finite field applying the properties of ergodic matrices and linearization method. Thus, we show that their proof of security is not correct for this public key encryption scheme. ©, 2014, Tien Tzu Hsueh Pao/Acta Electronica Sinica. All right reserved.
引用
收藏
相关论文
共 50 条
  • [21] A public key encryption scheme based on factoring and discrete logarithm
    Poulakis, Dimitrios
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2009, 12 (06): : 745 - 752
  • [22] A Hybrid-key Based Image Encryption and Authentication Scheme with the Use of Ergodic Matrix
    Zhou, Xiaoyi
    Ma, Jixin
    Du, Wencai
    Zhao, Yongzhe
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 212 - 217
  • [23] On the Security and Key Generation of the ZHFE Encryption Scheme
    Zhang, Wenbin
    Tan, Chik How
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 289 - 304
  • [24] Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, King-Hang
    Wu, Jimmy Ming-Tai
    IEEE ACCESS, 2019, 7 : 49232 - 49239
  • [25] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [26] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [27] A Certificateless Threshold Public Key Encryption Scheme
    ZOU Xiubin1
    2.College of Computer and Mathematics
    3.Ira A.Fulton Schools of Engineering
    WuhanUniversityJournalofNaturalSciences, 2012, 17 (03) : 223 - 228
  • [28] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [29] Evolution of the McEliece Public Key Encryption Scheme
    Bucerzan, Dominic
    Dragoi, Vlad
    Kalachi, Herve Tale
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 129 - 149
  • [30] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102