A HYBRID ENCRYPTION SCHEME BASED ON THE SATISFIABILITY PROBLEM

被引:0
|
作者
Sun, Rui [1 ]
Peng, Qiao [1 ]
Tian, Youliang [2 ]
机构
[1] Guizhou Univ, Coll Math & Stat, Guiyang, Guizhou, Peoples R China
[2] Guizhou Univ, Guizhou Prov Key Lab Publ Big Data, Coll Comp Sci & Technol, Guiyang, Guizhou, Peoples R China
基金
中国国家自然科学基金;
关键词
SAT; Elgamal Encryption; Hybrid Encryption; Adaptive Chosen Ciphertext Attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the existing cryptographic schemes based on the satisfiability problem (SAT) lack the specific security model and the security analysis of the provable security theory, the security is questioned. For this problem, combining with the advantages of SAT and Elgamal scheme, we construct a secure, verifiable encryption scheme in this paper. Firstly, combining and improving the SRR(N,k,s) model based on the difficulty problem of the random regular formula near the phase transition point, we construct an encryption algorithm. Secondly, on the basis of the existing Damgard Elgamal scheme, a more secure scheme based on SAT and variants of discrete logarithm problem is proposed. Lastly, the analysis results show that compared with the existing SAT-based hybrid cryptographic schemes, the private key of the hybrid encryption scheme proposed in this paper is shorter and the ciphertext satisfies the verifiability, and the scheme can secure against adaptive chosen ciphertext attacks (CCA2).
引用
收藏
页码:1363 / 1367
页数:5
相关论文
共 50 条
  • [1] A Hybrid Encryption Scheme for Hadoop Based on Symmetric and Asymmetric Encryption
    Song, Lei
    Qin, Jun
    Liang, Shengxi
    Wang, Xing
    ADVANCED MATERIALS, MECHANICS AND INDUSTRIAL ENGINEERING, 2014, 598 : 691 - 694
  • [2] A New Encryption Scheme based on Hybrid Problems
    Sahu, Hemlal
    Sharma, B. K.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 524 - 527
  • [3] Hybrid encryption scheme based on temporal ghost imaging
    Kang Yi
    Zhang Leihong
    Ye Hualong
    Zhang Dawei
    APPLIED PHYSICS B-LASERS AND OPTICS, 2021, 127 (08):
  • [4] A Location Privacy Protection Scheme Based on Hybrid Encryption
    Li, Li
    Lv, Zhengjuan
    Tong, Xiaohong
    Shi, Runhua
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019), 2019,
  • [5] A Hybrid Multiresolution Wavelet Transform Based Encryption Scheme
    Rakheja, Pankaj
    Vig, Rekha
    Singh, Phool
    EMERGING TRENDS IN MATHEMATICAL SCIENCES AND ITS APPLICATIONS, 2019, 2061
  • [6] Hybrid encryption scheme based on temporal ghost imaging
    Kang Yi
    Zhang Leihong
    Ye Hualong
    Zhang Dawei
    Applied Physics B, 2021, 127
  • [7] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [8] A hybrid scheme for encryption and watermarking
    Xu, XW
    Dexter, S
    Eskicioglu, AM
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 725 - 736
  • [9] A NEW HYBRID ENCRYPTION SCHEME
    Nesterenko, A. Yu.
    Pugachev, A. V.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2015, 30 (04): : 56 - 71
  • [10] An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
    Bellare, M
    Boldyreva, A
    Palacio, A
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 171 - 188