Public-Key Cryptography Based on Tropical Circular Matrices
نویسندگان
چکیده
Some public-key cryptosystems based on the tropical semiring have been proposed in recent years because of their increased efficiency, since multiplication is actually an ordinary addition numbers and there no semiring. However, most these security defects they adopt a public matrix to construct commutative semirings. This paper proposes new circular matrices. The relies NP-hard problem solving nonlinear systems integers. Since used matrices cannot be expressed by known matrix, can resist KU attacks. There operation cryptosystem, it RM considered as potential post-quantum cryptosystem.
منابع مشابه
RFID Privacy Based on Public-Key Cryptography
RFID systems makes it possible for a server to identify known tags in wireless settings. As they become more and more pervasive, people privacy is more and more threatened. In this talk, we list a few models for privacy in RFID and compare them. We review a few protocols. We further show that strong privacy mandates the use of public-key cryptography. Finally, we present a new cryptosystem whic...
متن کاملPublic Key Cryptography based on Semigroup Actions
A generalization of the original Diffie-Hellman key exchange in (Z/pZ) found a new depth when Miller [27] and Koblitz [16] suggested that such a protocol could be used with the group over an elliptic curve. In this paper, we propose a further vast generalization where abelian semigroups act on finite sets. We define a Diffie-Hellman key exchange in this setting and we illustrate how to build in...
متن کاملPublic-Key Cryptography Based on Modular Lattices
We present an approach to generalization of practical Identity-Based Encryption scheme of [BF01]. In particular we show how the protocol could be used on finite modular lattices and as a special case on vector spaces over finite field. The original proof of security for this protocol does not hold in this general algebraic structure, thus this is still a work in progress.
متن کاملPublic key cryptography based on coding theory
In this thesis we view the statistical decoding algorithm, which tries to solve the general decoding problem as well as the variants of the McEliece cryptosystem based on Gabidulin codes. The first part of the thesis is dedicated to the general concept of public key cryptography on the basis of coding theory and the security of the underlying problems. Thus after presenting the basic principles...
متن کاملPublic key cryptography based on semigroup actions
A generalization of the original Diffie-Hellman key exchange in (Z/pZ) found a new depth when Miller [27] and Koblitz [16] suggested that such a protocol could be used with the group over an elliptic curve. In this paper, we propose a further vast generalization where abelian semigroups act on finite sets. We define a Diffie-Hellman key exchange in this setting and we illustrate how to build in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2022
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app12157401