QTRU: Quaternionic Version of the NTRU Public-Key Cryptosystems

被引:0
|
作者
Malekian, Ehsan [1 ]
Zakerolhosseini, Ali [1 ]
Mashatan, Atefeh [2 ]
机构
[1] Shahid Beheshti Univ, Fac Elect & Comp Engn, Tehran, Iran
[2] Ecole Polytech Fed Lausanne, Secur & Cryptog Lab, CH-1015 Lausanne, Switzerland
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2011年 / 3卷 / 01期
关键词
QTRU; NTRU; Quaternion Algebra; Public-Key Cryptography; Encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not. fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent security on the intractability of finding the shortest vector in a certain non-convolutional modular lattice, yet it is efficient and cost effective, contrary to cryptosystems such as RSA or ECC. The detailed specification of the proposed cryptosystem, including the underhung algebraic structure, key generation, encryption and decryption process and also the issues regarding key security, message security, and probability of successful decryption are explained. We will further show, based on the existing results for lattice-reduction algorithms, that the proposed cryptosystem with a dimension of 41 will have a security equal to NTRU-167. (C) 2011 ISC. All rights reserved.
引用
收藏
页码:29 / 42
页数:14
相关论文
共 50 条
  • [41] ON PUBLIC-KEY CRYPTOSYSTEMS BUILT USING POLYNOMIAL-RINGS
    PIEPRZYK, JP
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 219 : 73 - 78
  • [42] More on security of public-key cryptosystems based on Chebyshev polynomials
    Cheong, Kai Y.
    Koshiba, Takeshi
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2007, 54 (09) : 795 - 799
  • [43] Embedded public-key cryptosystems via enhanced Montgomery multiplication
    Gastaldo, Paolo
    Parodi, Giovanni
    Picasso, Francesco
    Zunino, Rodolfo
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, PROCEEDINGS, VOLS 1-8, 2007, : 1820 - 1825
  • [44] Public-key cryptosystems based on composite degree residuosity classes
    Paillier, P
    ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 223 - 238
  • [45] A DIGITAL MULTISIGNATURE SCHEME USING BIJECTIVE PUBLIC-KEY CRYPTOSYSTEMS
    OKAMOTO, T
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1988, 6 (04): : 432 - 441
  • [46] Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes
    Calkavur, Selda
    ENTROPY, 2022, 24 (04)
  • [47] Fast modular multiplication and parallel algorithms in public-key cryptosystems
    Luo, P
    Dai, YQ
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES A-MATHEMATICAL ANALYSIS, 2004, 11 (5-6): : 675 - 689
  • [48] An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map
    Tan, Tao
    Zhang, Liming
    Liu, Shuaikang
    Wang, Lei
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [49] On the use of the discrete power function for building public-key cryptosystems
    Groza, Bogdan
    PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS, 2007, : 7 - 11
  • [50] Public-key cryptosystems based on cubic finite field extensions
    Gong, G
    Harn, L
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (07) : 2601 - 2605