A New Secure Encryption Scheme Based on Group Factorization Problem

被引:2
|
作者
Cong, Yue [1 ]
Hong, Haibo [2 ]
Shao, Jun [2 ]
Han, Song [2 ]
Lin, Jianhong [3 ]
Zhao, Shuai [2 ,4 ]
机构
[1] Zhejiang Agr Business Coll, Shaoxing 312088, Peoples R China
[2] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
[3] Zhejiang Ponshine Informat Technol Co, Hangzhou 310000, Peoples R China
[4] Zhejiang Gongshang Univ, Comp Ctr, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption scheme; group factorization problem; logarithmic signatures; random covers; PUBLIC-KEY CRYPTOSYSTEM; CRYPTANALYSIS; MATRICES; ALGORITHMS;
D O I
10.1109/ACCESS.2019.2954672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As special types of factorization of finite groups, logarithmic signatures and covers have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, MST3 and eMST(3). In particular, as a natural analogue of integer factorization problem (IFP), group factorization problem (GFP) and its hardness assumption over certain factorization basis, referred as logarithmic signature, play a core role in the security arguments for the family of MST cryptosystems. Security is not the unique goal of designing a cryptosystem. Instead, efficiency is also a major issue. In this paper, we design a new secure encryption scheme based on group factorization problem (GFP). Furthermore, we present the security analysis and demonstrate the performance of our scheme. Comparing with eMST3, our scheme is simplified with more efficiency.
引用
收藏
页码:168728 / 168735
页数:8
相关论文
共 50 条
  • [41] An Encryption Scheme for a Secure Policy Updating
    Ibraimi, Luan
    Asim, Muhammad
    Petkovic, Milan
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 304 - +
  • [42] A Secure Lightweight Texture Encryption Scheme
    Jolfaei, Alireza
    Wu, Xin-Wen
    Muthukkumarasamy, Vallipuram
    IMAGE AND VIDEO TECHNOLOGY - PSIVT 2015 WORKSHOPS, 2016, 9555 : 344 - 356
  • [43] A note on a provable secure encryption scheme
    Wang M.-Q.
    Qin J.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 E (06) : 655 - 658
  • [44] Computationally secure uncloneable encryption scheme
    Ma, Z
    Lü, X
    Feng, DG
    IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 927 - 930
  • [45] AN ENCRYPTION SCHEME FOR A SECURE POLICY UPDATING
    Ibraimi, Luan
    Asim, Muhammad
    Petkovic, Milan
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 399 - 408
  • [46] An Indistinguishably Secure Function Encryption Scheme
    Zhang, Ping
    Li, Yamin
    Liu, Muhua
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [47] A New Encryption Scheme Based on Groupring
    Inam, Saba
    Kanwal, Shamsa
    Ali, Rashid
    CONTEMPORARY MATHEMATICS, 2021, 2 (02): : 103 - 112
  • [48] A New Forward-Secure Authenticated Encryption Scheme with Message Linkages
    LI Yanping~ 1
    2. College of Mathematics and Information Science
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1537 - 1540
  • [49] Semantically secure authenticated encryption scheme and the same scheme for ad-hoc group called a ring
    Lee, Ji-Seon
    Chang, Jik Hyun
    INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 825 - +
  • [50] A Secure Order-Preserving Encryption Scheme Based on Encrypted Index
    Chen, Haobin
    Liang, Ji
    Qin, Xiaolin
    WEB AND BIG DATA, PT III, APWEB-WAIM 2022, 2023, 13423 : 247 - 261