Security on public key encryption scheme based on ergodic matrices

被引:0
|
作者
School of Computer Engineering, Jiangsu University of Technology, Changzhou [1 ]
Jiangsu
213001, China
不详 [2 ]
Anhui
230027, China
不详 [3 ]
Jiangsu
210003, China
机构
来源
Tien Tzu Hsueh Pao | / 10卷 / 2081-2085期
关键词
D O I
10.3969/j.issn.0372-2112.2014.10.033
中图分类号
学科分类号
摘要
For the public key encryption scheme based on the ergodic matrices constructed by Pei et al., this paper proves that breaking this scheme is not harder than solving polynomial discrete logarithm problem on finite field applying the properties of ergodic matrices and linearization method. Thus, we show that their proof of security is not correct for this public key encryption scheme. ©, 2014, Tien Tzu Hsueh Pao/Acta Electronica Sinica. All right reserved.
引用
收藏
相关论文
共 50 条
  • [41] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin (National Key Lab of Integrated Service Networks
    Journal of Electronics(China), 2005, (05) : 490 - 497
  • [42] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin National Key Lab of Integrated Service Networks Xidian Univ Xian China
    Journal of Electronics, 2005, (05) : 490 - 497
  • [43] A Provably Secure Public Key Encryption Scheme Based on Isogeny Star
    Han, Weiwei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (06) : 623 - 627
  • [44] A Practical Public Key Encryption Scheme Based on Learning Parity With Noise
    Yu, Zhimin
    Gao, Chong-Zhi
    Jing, Zhengjun
    Gupta, Brij Bhooshan
    Cai, Qiuru
    IEEE ACCESS, 2018, 6 : 31918 - 31923
  • [45] Design and implementation of a chaos-based public key encryption scheme
    Wang, XB
    Zhang, LH
    Wu, Y
    PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 79 - 82
  • [46] Improvement in public-key encryption and key exchange scheme based on Chebyshev polynomials
    School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    不详
    不详
    Tiedao Xuebao, 2006, 5 (95-98):
  • [47] Quantum public key encryption scheme with four states key
    Liu, Zhixin
    Xie, Qiaoling
    Zha, Yongfu
    Dong, Yumin
    PHYSICA SCRIPTA, 2022, 97 (04)
  • [48] An Improved Security Scheme of Public Key
    Xie, Congge
    Wang, Xiaofeng
    Fang, Yingyu
    PROCEEDINGS OF THE 2013 ASIA-PACIFIC COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY CONFERENCE, 2013, : 207 - 213
  • [49] Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication
    Jin, Liang
    Hu, Xiaoyan
    Sun, Xiaoli
    Lou, Yangming
    Huang, Kaizhi
    Zhong, Zhou
    Xu, Xiaoming
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2021,
  • [50] On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme
    Lu, Yang
    Wang, Gang
    Li, Jiguo
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (01): : 56 - 62