New Public-Key Cryptosystem Based on Two-Dimension DLP

被引:2
|
作者
Zhang, Xiaoqiang [1 ]
Zhu, Guiliang [2 ]
Wang, Weiping [2 ]
Wang, Mengmeng [2 ]
Ma, Shilong [1 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing, Peoples R China
[2] North China Univ Water Conservancy & Elect Power, Zhengzhou, Henan, Peoples R China
关键词
asymmetric cryptosystem; discrete logarithm problem (DLP); two dimensions; RSA; ECC (elliptic curve cryptosystem);
D O I
10.4304/jcp.7.1.169-178
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The asymmetric cryptosystem plays an important role in the cryptology nowadays. It is widely used in the fields of data encryption, digital watermarking, digital signature, secure network protocol, etc. However, with the improvement of computing capability, longer and longer the key length is required to ensure the security of interaction information. To shorten the key length and improve the encryption efficiency, by defining the two-dimension discrete logarithm problem (DLP), a new public-key cryptosystem is proposed. This new cryptosystem generalizes the public-key cryptosystem from one dimension to two dimensions. The core algorithms of the proposed cryptosystem are also designed, including the fast algorithm, computing the inverse matrix modulo p and finding the period. To verify the correctness and rationality of the new cryptosystem, two examples are carried out. Meanwhile, the efficiency and security are analyzed in detail. Experimental results and theoretical analyses show that the new cryptosystem possesses the advantages of the outstanding robustness, short key length, high security and encrypting many data once.
引用
收藏
页码:169 / 178
页数:10
相关论文
共 50 条
  • [41] AN RSA BASED PUBLIC-KEY CRYPTOSYSTEM FOR SECURE COMMUNICATION
    VENKAIAH, VCH
    PROCEEDINGS OF THE INDIAN ACADEMY OF SCIENCES-MATHEMATICAL SCIENCES, 1992, 102 (02): : 147 - 153
  • [42] A PUBLIC-KEY CRYPTOSYSTEM BASED ON SHIFT REGISTER SEQUENCES
    NIEDERREITER, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 219 : 35 - 39
  • [43] PUBLIC-KEY CRYPTOSYSTEM BASED ON LANGUAGE THEORY.
    Salomaa, Arto
    Computers and Security, 1988, 7 (01): : 83 - 87
  • [44] PASSWORD AUTHENTICATION BASED ON PUBLIC-KEY DISTRIBUTION CRYPTOSYSTEM
    HARN, L
    HUANG, D
    LAIH, CS
    PROCEEDINGS : FIFTH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, 1989, : 332 - 338
  • [45] A Multipurpose Public-key Cryptosystem Based Image Watermarking
    Ding, Yu-Wen
    Lin, Zi
    Wang, Li
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12584 - 12587
  • [46] PIEPRZYK PUBLIC-KEY CRYPTOSYSTEM IS INSECURE
    YANG, YX
    ELECTRONICS LETTERS, 1987, 23 (20) : 1043 - 1044
  • [47] A Knapsack Public-key Cryptosystem Using Two Random Sequences
    Murakami, Yasuyuki
    Hamasho, Shinsuke
    Kasahara, Masao
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 497 - 501
  • [48] Comment on the “Quantum Public-Key Cryptosystem”
    Ri-gui Zhou
    Wei Li
    Tian-tian Huan
    International Journal of Theoretical Physics, 2015, 54 : 1033 - 1037
  • [49] A generalization of the ElGamal public-key cryptosystem
    Ranasinghe, Rajitha
    Athukorala, Pabasara
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2395 - 2403
  • [50] A Differential Knapsack Public-Key Cryptosystem
    Murakami, Yasuyuki
    Kasahara, Masao
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 613 - 617