A New Secure Encryption Scheme Based on Group Factorization Problem

被引:2
|
作者
Cong, Yue [1 ]
Hong, Haibo [2 ]
Shao, Jun [2 ]
Han, Song [2 ]
Lin, Jianhong [3 ]
Zhao, Shuai [2 ,4 ]
机构
[1] Zhejiang Agr Business Coll, Shaoxing 312088, Peoples R China
[2] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
[3] Zhejiang Ponshine Informat Technol Co, Hangzhou 310000, Peoples R China
[4] Zhejiang Gongshang Univ, Comp Ctr, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption scheme; group factorization problem; logarithmic signatures; random covers; PUBLIC-KEY CRYPTOSYSTEM; CRYPTANALYSIS; MATRICES; ALGORITHMS;
D O I
10.1109/ACCESS.2019.2954672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As special types of factorization of finite groups, logarithmic signatures and covers have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, MST3 and eMST(3). In particular, as a natural analogue of integer factorization problem (IFP), group factorization problem (GFP) and its hardness assumption over certain factorization basis, referred as logarithmic signature, play a core role in the security arguments for the family of MST cryptosystems. Security is not the unique goal of designing a cryptosystem. Instead, efficiency is also a major issue. In this paper, we design a new secure encryption scheme based on group factorization problem (GFP). Furthermore, we present the security analysis and demonstrate the performance of our scheme. Comparing with eMST3, our scheme is simplified with more efficiency.
引用
收藏
页码:168728 / 168735
页数:8
相关论文
共 50 条
  • [31] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
  • [32] A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication
    Yang, Yijun
    Yu, Jianping
    Zhang, Peng
    Wang, Shulan
    COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE, 2015, 2015
  • [33] Secure communication using a chaos based signal encryption scheme
    Murali, K
    Yu, HY
    Varadan, V
    Leung, H
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2001, 47 (04) : 709 - 714
  • [34] An Attribute-Based Encryption Scheme to Secure Fog Communications
    Alrawais, Arwa
    Alhothaily, Abdulrahman
    Hu, Chunqiang
    Xing, Xiaoshuang
    Cheng, Xiuzhen
    IEEE ACCESS, 2017, 5 : 9131 - 9138
  • [35] A Fully Secure Spatial Encryption Scheme
    Moriyama, Daisuke
    Doi, Hiroshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 28 - 35
  • [36] A new image encryption scheme for secure digital images based on combination of polynomial chaotic maps
    Abd El-Latif, Ahmed A.
    Li, Li
    Wang, Ning
    Peng, Jia-Liang
    Shi, Zhenfeng
    Niu, Xiamu
    Research Journal of Applied Sciences, Engineering and Technology, 2012, 4 (04) : 322 - 328
  • [37] A Note on a Provable Secure Encryption Scheme
    王明强
    秦静
    JournalofShanghaiJiaotongUniversity(Science), 2008, 13 (06) : 655 - 658
  • [38] Secure Variants of the Square Encryption Scheme
    Clough, Crystal Lee
    Ding, Jintai
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 153 - +
  • [39] Circular Secure Homomorphic Encryption Scheme
    Zhao X.
    Fu Y.
    Song W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2117 - 2124
  • [40] A New Chaos-Based Secure Image Encryption Scheme Using Multiple Substitution Boxes
    Khan, Jan Sher
    ur Rehman, Atique
    Ahmad, Jawad
    Habib, Zeeshan
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 16 - 21