A HYBRID ENCRYPTION SCHEME BASED ON THE SATISFIABILITY PROBLEM

被引:0
|
作者
Sun, Rui [1 ]
Peng, Qiao [1 ]
Tian, Youliang [2 ]
机构
[1] Guizhou Univ, Coll Math & Stat, Guiyang, Guizhou, Peoples R China
[2] Guizhou Univ, Guizhou Prov Key Lab Publ Big Data, Coll Comp Sci & Technol, Guiyang, Guizhou, Peoples R China
基金
中国国家自然科学基金;
关键词
SAT; Elgamal Encryption; Hybrid Encryption; Adaptive Chosen Ciphertext Attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the existing cryptographic schemes based on the satisfiability problem (SAT) lack the specific security model and the security analysis of the provable security theory, the security is questioned. For this problem, combining with the advantages of SAT and Elgamal scheme, we construct a secure, verifiable encryption scheme in this paper. Firstly, combining and improving the SRR(N,k,s) model based on the difficulty problem of the random regular formula near the phase transition point, we construct an encryption algorithm. Secondly, on the basis of the existing Damgard Elgamal scheme, a more secure scheme based on SAT and variants of discrete logarithm problem is proposed. Lastly, the analysis results show that compared with the existing SAT-based hybrid cryptographic schemes, the private key of the hybrid encryption scheme proposed in this paper is shorter and the ciphertext satisfies the verifiability, and the scheme can secure against adaptive chosen ciphertext attacks (CCA2).
引用
收藏
页码:1363 / 1367
页数:5
相关论文
共 50 条
  • [21] Video encryption scheme using hybrid encryption technology
    Han, Qingqing
    Wang, Liejun
    Lee, Yongming
    Qin, Jiwei
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2020, 13 (01) : 1 - 8
  • [22] A new image encryption scheme based on hybrid chaotic maps
    Ahmad Pourjabbar Kari
    Ahmad Habibizad Navin
    Amir Massoud Bidgoli
    Mirkamal Mirnia
    Multimedia Tools and Applications, 2021, 80 : 2753 - 2772
  • [23] A complex task scheduling scheme for big data platforms based on Boolean Satisfiability Problem
    Hong, Huang
    Khan, Latifur
    Ayoade, Gbadebo G.
    Zhou Shaohua
    Wei Yong
    2018 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2018, : 170 - 177
  • [24] A new paradigm of hybrid encryption scheme
    Kurosawa, K
    Desmedt, Y
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 426 - 442
  • [25] Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme
    Liu, Meng
    Luo, Yun
    Nanda, Priyadarsi
    Yu, Shui
    Zhang, Jianbing
    COMPUTATIONAL INTELLIGENCE, 2019, 35 (03) : 555 - 576
  • [26] Hybrid image encryption scheme based on hyperchaotic map with spherical attractors
    Han, Zhitang
    Cao, Yinghong
    Banerjee, Santo
    Mou, Jun
    CHINESE PHYSICS B, 2025, 34 (03)
  • [27] Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem
    Liu, Meng
    Nanda, Priyadarsi
    Zhang, Xuyun
    Yang, Chi
    Yu, Shui
    Li, Jianxin
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 990 - 995
  • [28] Double image encryption based on a hybrid phase-truncation scheme
    Luan, Guangyu
    Quan, Chenggen
    JOURNAL OF MODERN OPTICS, 2023, 70 (10) : 613 - 622
  • [29] Hybrid Secure Cloud Storage data based on improved Encryption Scheme
    Deepthi, B.
    Ramani, G.
    Deepika, R.
    Shabbeer, Md
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 776 - 779
  • [30] A novel color image encryption scheme based on hybrid chaotic maps
    Li, Yu-Cheng
    Tang, De-You
    Ye, Rui-Song
    PROCEEDINGS OF THE 2019 14TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2019), 2019, : 1431 - 1436