A New Secure Encryption Scheme Based on Group Factorization Problem

被引:2
|
作者
Cong, Yue [1 ]
Hong, Haibo [2 ]
Shao, Jun [2 ]
Han, Song [2 ]
Lin, Jianhong [3 ]
Zhao, Shuai [2 ,4 ]
机构
[1] Zhejiang Agr Business Coll, Shaoxing 312088, Peoples R China
[2] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
[3] Zhejiang Ponshine Informat Technol Co, Hangzhou 310000, Peoples R China
[4] Zhejiang Gongshang Univ, Comp Ctr, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption scheme; group factorization problem; logarithmic signatures; random covers; PUBLIC-KEY CRYPTOSYSTEM; CRYPTANALYSIS; MATRICES; ALGORITHMS;
D O I
10.1109/ACCESS.2019.2954672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As special types of factorization of finite groups, logarithmic signatures and covers have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, MST3 and eMST(3). In particular, as a natural analogue of integer factorization problem (IFP), group factorization problem (GFP) and its hardness assumption over certain factorization basis, referred as logarithmic signature, play a core role in the security arguments for the family of MST cryptosystems. Security is not the unique goal of designing a cryptosystem. Instead, efficiency is also a major issue. In this paper, we design a new secure encryption scheme based on group factorization problem (GFP). Furthermore, we present the security analysis and demonstrate the performance of our scheme. Comparing with eMST3, our scheme is simplified with more efficiency.
引用
收藏
页码:168728 / 168735
页数:8
相关论文
共 50 条
  • [1] A NEW SECURE AND EFFICIENT SCHEME OF ADPCM ENCODER BASED ON CHAOTIC ENCRYPTION
    Hamdi, Mimoun
    Hermassi, Houcemeddine
    Rhouma, Rhouma
    Belghith, Safya
    2014 1ST INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP 2014), 2014, : 7 - 11
  • [2] New multistage secret sharing scheme based on the factorization problem
    Lee, NY
    Hwang, T
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2001, 17 (03) : 525 - 529
  • [3] An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization
    Gavin, Gerald
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 451 - 464
  • [4] A new secure and sensitive image encryption scheme based on new substitution with chaotic function
    Department of Communication Engineering, East Azarbaijan Science and Research Branch, Islamic Azad University, Tabriz, Iran
    不详
    不详
    Multimedia Tools Appl, 17 (10631-10648):
  • [5] A new secure and sensitive image encryption scheme based on new substitution with chaotic function
    Parvin, Zahra
    Seyedarabi, Hadi
    Shamsi, Mousa
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (17) : 10631 - 10648
  • [6] A new secure and sensitive image encryption scheme based on new substitution with chaotic function
    Zahra Parvin
    Hadi Seyedarabi
    Mousa Shamsi
    Multimedia Tools and Applications, 2016, 75 : 10631 - 10648
  • [7] A new biometric identity based encryption scheme secure against DoS attacks
    Sarier, Neyire Deniz
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 23 - 32
  • [8] A Secure and Lightweight Chaos Based Image Encryption Scheme
    Khan, Fadia Ali
    Ahmed, Jameel
    Alqahtani, Fehaid
    Alsuhibany, Suliman A.
    Ahmed, Fawad
    Ahmad, Jawad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 279 - 294
  • [9] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [10] A secure encryption scheme based on certificateless proxy signature
    Sudharani K.
    Sakthivel P.N.K.
    Sudharani, K. (ksudharani.shagthi@gmail.com), 2018, Inderscience Publishers (07) : 40 - 64