A New Secure Encryption Scheme Based on Group Factorization Problem

被引:2
|
作者
Cong, Yue [1 ]
Hong, Haibo [2 ]
Shao, Jun [2 ]
Han, Song [2 ]
Lin, Jianhong [3 ]
Zhao, Shuai [2 ,4 ]
机构
[1] Zhejiang Agr Business Coll, Shaoxing 312088, Peoples R China
[2] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
[3] Zhejiang Ponshine Informat Technol Co, Hangzhou 310000, Peoples R China
[4] Zhejiang Gongshang Univ, Comp Ctr, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption scheme; group factorization problem; logarithmic signatures; random covers; PUBLIC-KEY CRYPTOSYSTEM; CRYPTANALYSIS; MATRICES; ALGORITHMS;
D O I
10.1109/ACCESS.2019.2954672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As special types of factorization of finite groups, logarithmic signatures and covers have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, MST3 and eMST(3). In particular, as a natural analogue of integer factorization problem (IFP), group factorization problem (GFP) and its hardness assumption over certain factorization basis, referred as logarithmic signature, play a core role in the security arguments for the family of MST cryptosystems. Security is not the unique goal of designing a cryptosystem. Instead, efficiency is also a major issue. In this paper, we design a new secure encryption scheme based on group factorization problem (GFP). Furthermore, we present the security analysis and demonstrate the performance of our scheme. Comparing with eMST3, our scheme is simplified with more efficiency.
引用
收藏
页码:168728 / 168735
页数:8
相关论文
共 50 条
  • [21] A HYBRID ENCRYPTION SCHEME BASED ON THE SATISFIABILITY PROBLEM
    Sun, Rui
    Peng, Qiao
    Tian, Youliang
    2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 1363 - 1367
  • [22] Group-based proxy re-encryption scheme secure against chosen ciphertext attack
    Ma, Chunbo
    Ao, Jun
    International Journal of Network Security, 2009, 8 (03) : 266 - 270
  • [23] Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace
    Liu, Jiasen
    Wang, Chao
    Tu, Zheng
    Wang, Xu An
    Lin, Chuan
    Li, Zhihu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [24] Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
    Ren, Yanli
    Gu, Dawu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 104 - 115
  • [25] A homomorphic encryption-based secure electronic voting scheme
    Huszti, Andrea
    PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 479 - 496
  • [26] A visually secure image encryption scheme based on compressive sensing
    Chai, Xiuli
    Gan, Zhihua
    Chen, Yiran
    Zhang, Yushu
    SIGNAL PROCESSING, 2017, 134 : 35 - 51
  • [27] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537
  • [28] An Efficient and Provably Secure Certificate-Based Encryption Scheme
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 54 - 61
  • [29] Secure and Efficient Code Encryption Scheme Based on Indexed Table
    Cho, Sungkyu
    Shin, Donghwi
    Jo, Heasuk
    Choi, Donghyun
    Won, Dongho
    Kim, Seungjoo
    ETRI JOURNAL, 2011, 33 (01) : 60 - 70
  • [30] A Secure Partial Encryption Scheme Based on Bit Plane Manipulation
    Mondal, Bhaskar
    Mandal, Tarni
    Kumar, Punj
    Biswas, Neel
    2017 7TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED), 2017,