An Efficient Method of Shared Key Generation Based on Truncated Polynomials

被引:0
|
作者
Roja, P. Prapoorna [1 ]
Avadhani, P. S. [1 ]
Prasad, E. V. [1 ]
机构
[1] JNTU Coll Engn, GVP Coll Engn, AU Coll Engn Visakhapatnam, Kakinada, India
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many of the public key cryptosystems deal with two-party communication keeping confidentiality and authentication as primary goals. However there are many applications like banking that require multi-party communication. Though systems like RSA provided multi-party communication using shared key approach, overheads of RSA seem to be more because it has to choose n pairs of numbers such that the summation of these numbers is a large prime number. This needs to be done without revealing the shares of the numbers [1, 2]. The public key cryptosystem NTRU, based on polynomials, can be used for multi-party communication. This cryptosystem does not require these overheads. This paper proposes an algorithm for shared key authentication based on NTRU for multi-party communication, by giving algorithms for encryption, decryption and key generation.
引用
收藏
页码:156 / 161
页数:6
相关论文
共 50 条
  • [1] Distributed pairwise key generation using shared polynomials for wireless ad hoc networks
    Mukherjee, A
    Deng, HM
    Agrawal, DP
    MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2005, 162 : 215 - 226
  • [2] Differential polynomials of L-functions with truncated shared values
    Zhu, Wan-Qiong
    Chen, Jun-Fan
    OPEN MATHEMATICS, 2019, 17 : 1113 - 1125
  • [3] On A Practical Distributed Key Generation Scheme Based on Bivariate Polynomials
    Wu Qian
    Chen, Huiyan
    Li, Zichen
    Jia, Cheng
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [4] κ-PARTY SHARED RSA KEY GENERATION
    He Mingxing Fan Pingzhi Zhang Xiaoqiang(Southwest Jiaotong University
    JournalofElectronics(China), 2003, (01) : 51 - 56
  • [5] An efficient method for generation of conference key applying block design
    Bae, Y
    Chung, I
    Kang, SK
    PDPTA'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, 2001, : 1700 - 1704
  • [6] A Method of Automatic Key Generation Based on Handwriting
    Yin, Chunyong
    Sun, Ruxia
    Bi, Shuoben
    SNPD 2009: 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, : 213 - 214
  • [7] Secure and efficient group key management with shared key derivation
    Lin, Jen-Chiun
    Huang, Kuo-Hsuan
    Lai, Feipei
    Lee, Hung-Chang
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 192 - 208
  • [8] ShakeMe: Key Generation From Shared Motion
    Yuzuguzel, Hidir
    Niemi, Jari
    Kiranyaz, Serkan
    Gabbouj, Moncef
    Heinz, Thomas
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 2134 - 2137
  • [9] Weaknesses in shared RSA key generation protocols
    Blackburn, SR
    Blake-Wilson, S
    Burmester, M
    Galbraith, SD
    CRYPTOGRAPHY AND CODING, 1999, 1746 : 300 - 306
  • [10] Efficient generation of shared RSA keys
    Boneh, D
    Franklin, M
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 425 - 439