Advanced Search
Volume 32 Issue 7
Aug.  2010
Turn off MathJax
Article Contents
Wang Bao-cang, Wei Yong-zhuang, Hu Yu-pu. Public Key Cryptosystem Using Random Knapsacks[J]. Journal of Electronics & Information Technology, 2010, 32(7): 1580-1584. doi: 10.3724/SP.J.1146.2009.01113
Citation: Wang Bao-cang, Wei Yong-zhuang, Hu Yu-pu. Public Key Cryptosystem Using Random Knapsacks[J]. Journal of Electronics & Information Technology, 2010, 32(7): 1580-1584. doi: 10.3724/SP.J.1146.2009.01113

Public Key Cryptosystem Using Random Knapsacks

doi: 10.3724/SP.J.1146.2009.01113
  • Received Date: 2009-08-21
  • Rev Recd Date: 2010-02-22
  • Publish Date: 2010-07-19
  • A knapsack-type public key cryptosystem is proposed. The proposed knapsack cryptosystem has the following advantages. The encryption and decryption only need addition and modular minus operations, so the encryption and decryption speed is high; The cryptosystem is constructed based on random knapsacks but not easy-to-solve knapsack problems; It is proven that if the secret key is not possessed by the attacker, the proposed cryptosystem can withstand the attacks launched by directly solving the underlying knapsack problem, including low-density attack and simultaneous Diophantine approximation attack; It is proven that the attacker can recover the secret keys if and only if he can factor a large integer. Analysis shows that the proposal is an efficient and secure public key encryption algorithm.
  • loading
  • 姜正涛,张京良,王育民. 一种新的等价于大整数分解的公钥密码体制研究[J].电子与信息学报.2008, 30(6):1450-1452浏览[2]杨军,周贤伟. 基于离散对数问题的两层分散式组密钥管理方案[J].电子与信息学报.2008, 30(6):1457-1461浏览[3]Merkle R C and Hellman M E. Hiding information andsignatures in trapdoor knapsacks[J].IEEE Transactions onInformation Theory.1978, 24(5):525-530[4]杨健,杜增吉,乔军. 基于Rabin 算法的超递增背包公钥密码体制的研究与改进[J]. 数学的实践与认识,2009, 39(2):109-114.Yang Jian, Du Zeng-ji, and Qiao Jun. The study in knapsackof public-key system based on Merkle-Hellman knapsacksystem and Rabin algorithm[J]. Mathematics in Practice andTheory, 2009, 39(2): 109-114.[5]张卫东,王保仓,胡予濮. 一种新的背包型公钥密码[J]. 西安电子科技大学学报,2009, 36(3): 506-511.Zhang Wei-dong, Wang Bao-cang, and Hu Yu-pu. Newknapsack-type public-key cryptographic algorithm[J]. Journalof Xidian University, 2009, 36(3): 506-511.[6]Murakami Y and Nasako T. A new trapdoor in knapsackpublic-key cryptosystem with two sequences as the publickey[C]. The Third International Conference on Convergenceand Hybrid Information Technology-ICCIT 2008, Busan,Korea 2008: 357-362.[7]Su P and Tsai C. New cryptosystems design based onhybrid-mode problems[J]. Computers and ElectricalEngineering, 2009, 35(3): 478-484.[8]Hwang M, Lee C, and Tzeng S. A new knapsack public-keycryptosystem based on permutation combinationalgorithm[J]. International Journal of Applied Mathematicsand Computer Sciences, 2009, 5(1): 33-38.[9]Coster M J, Joux A, and LaMacchia B A, et al.. Improvedlow-density subset sum algorithms[J]. ComputationalComplexity, 1992, 2(2): 111-128.[10]Lagarias J C. Knapsack public key cryptosystems andDiophantine approximation[C]. Advances in Cryptology-CRYPTO 1983, New York: Plenum, 1984: 3-23.[11]Nguyen P and Stern J. Merkle-Hellman revisited: acryptanalysis of the Qu-Vanstone cryptosystem based ongroup factorizations[C]. Advances in Cryptology-Crypto 1997,Berlin: Springer-Verlag, 1997, LNCS 1294: 198-212.[12]Brickell E F and Odlyzko A M. Cryptanalysis: A survey ofrecent results[C]. Contemporary Cryptology, The Science ofInformation Integrity, New York, IEEE Press, 1992: 501-540.[13]Nasako T, Murakami Y, and Kasahara M. Security of a classof knapsack public-key cryptosystems against low-densityattack[J].IEICE Transactions on Fundamentals ofElectronics, Communications and Computer Sciences.2008,E91-A(10):2889-2892[14]Youssef A M. Cryptanalysis of a knapsack-based probabilisticencryption scheme[J].Information Sciences.2009, 179(18):3116-3121[15]Koblitz N. Algebraic Aspects of Cryptography[M]. Berlin:Springer-Verlag, 1998: 44-45.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3489) PDF downloads(1273) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return