Advanced Search
Volume 28 Issue 3
Sep.  2010
Turn off MathJax
Article Contents
Jiang Zheng-tao, Liu Yi, Wang Yu-min. Research on the Construction of Public-Key Cryptosystems Based on LFSR Residuosity Problem[J]. Journal of Electronics & Information Technology, 2006, 28(3): 542-545.
Citation: Jiang Zheng-tao, Liu Yi, Wang Yu-min. Research on the Construction of Public-Key Cryptosystems Based on LFSR Residuosity Problem[J]. Journal of Electronics & Information Technology, 2006, 28(3): 542-545.

Research on the Construction of Public-Key Cryptosystems Based on LFSR Residuosity Problem

  • Received Date: 2004-09-09
  • Rev Recd Date: 2005-04-21
  • Publish Date: 2006-03-19
  • Further research on the construction of public-key cryptosystem based on Linear Feedback Shift Register (LFSR) is provided, and the LFSR higher (non) residuosity problem is defined. Based on new intractability problems a new public-key encryption primitive with encryption/decryption procedures differ from GH is investigated. The encryption and decryption procedures are specified. It is further improved to be a probabilistic encryption scheme. Efficiency and security analysis of the proposed encryption scheme is provided. It has properties of one-wayness and semantic security. The one-wayness and semantic security are equivalent to higher LFSR residuosity and decisional LFSR residuosity problems respectively.
  • loading
  • Diffie W, Hellman M E. New directions in cryptography[J]. IEEETrans. on oflnformation Theory, 1976, IT-22 (6): 644 - 654.[2]Rivest R, Shamir A, Adleman L. A method for abstaining digitalsignatures and public-key cryptosystems[J].Comm. of the ACM.1978,21(2):120-[3]Rabin M 0 . Digital signatures and public key functions asintractable as factorization[R]. Cambridge: MITILCSITR-212,1979.[4]Williams H C. An M3 public-key encryption scheme[A].Advances in Cryptology-CRYPT0'85[C]. Berlin: Springer-Verlag, 1986: 358 - 368.[5]Paillier P. Public-key cryptosystems based on composite degreeresiduosity classes. Advances in Cryptology- EUROCRYPT'99[C], Berlin: Springer-Verlag, 1999, LNCS 1592: 223 - 238.[6]Smith P, Lennon M. LUC: A new public-key system[A].Proceeding of IFIP/Sec'93[C], Elsevier Science Publications,1994: 97- 111.[7]Gong G, Ham L. Public-key cryptosystems based on cubic finitefield extensions[J]. IEEE Trans. on Information Theory, 1999, IT-45(7): 2601 - 2605.[8]Gong G, Ham L, Wu H P. The GH public-key cryptosystem[A].Selected areas in cryptography[C]. SAC, Toronto, 2001: 284 -300.[9]Jiang Z T, Hao Y H, Wang Y M. A new public-key encryptionscheme based on lucas sequence[J]. Journal of Electronics-(China). 2005,22(5):490 - 497.[10]Paillier P, Pointcheval D. Efticient public-key cryptosystemprovably secure against active adversaries[A]. Advances inCryptology-ASIACRYPT'99[C], Berlin: Springer-Verlag, 1999,LNCS 1716: 163 - 179.[11]Catalano D, Gennaro R, Graham N H. The bit security ofPaillier's encryption scheme and its applications[A]. Advances inCryptology-EUROCRYPTO'O I [C], Berlin: Springer-Verlag,200 1, LNCS 2045: 229 - 243.[12]Damgard I, Jurik M. A generalization, a simplification and someapplication of Paillier's probabilistic public-key system[A].Advances in Cryptology-PKC'99[C], Berlin: Springer-Verlag,200 1, LNCS 1992: 1 19 - 136.[13]姜正涛, 庞辽军, 王育民. 一种高效的可选择验证完整性和消息源的加密体制[J].电子与信息学报.2005, 27(4):621-624浏览
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2470) PDF downloads(815) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return