A Pre - Computation Scheme for Speeding Up Public - Key Cryptosystems
نویسنده
چکیده
This thesis presents fast and practical methods for generating randomly distributed pairs of the form (x, gX mod p) or (x, xe mod N), using precomputation. These generation schemes are of wide applicability for speeding-up public key systems that depend on exponentiation and offer a smooth memory-speed trade-off. The steps involving exponentiation in these systems can be reduced significantly in many cases. The schemes are most suited for server applications. The thesis also presents security analyses of the schemes using standard assumptions. The methods are novel in the sense that they identify and thoroughly exploit the randomness issues related to the instances generated in these public-key schemes. The constructions use random walks on Cayley (expander) graphs over Abelian groups. Thesis Supervisor: Shafi Goldwasser Title: Professor of Computer Science Acknowledgments I would like to start by expressing my deepest gratitude to Shafi Goldwasser, my thesis advisor, for her continued advice and fruitful discussions. She has been very helpful and supporting throughout my time at MIT, and I look forward to further work with her. The work for this thesis was performed in part at Bellcore under the direction of and in collaboration with Ramarathnam Venkatesan. I would like to thank Marcus Peinado for investigating the hidden subset sum problems related to our generators, and for collaborating on the conference version of our paper. I would also like to thank Ronald Rivest and Arjen Lenstra for their help, advice, and discussions. Finally, I would like to thank my parents for making me possible, and for their constant love and encouragement.
منابع مشابه
An efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملConstruction of Extended Multivariate Public Key Cryptosystems
Based on the ideas: “invertible cycle”, “tame transformation” and “special oil and vinegar”, three different nonlinear invertible transformations were constructed separately. Then making use of the idea of the extended multivariate public key cryptosystem, and combining the nonlinear invertible transformations above with Matsumoto-Imai (MI) scheme, three methods of designing extended multivaria...
متن کاملIntegration of Admission Control and Group Key Agreement
In this paper we present an authenticated group key agreement scheme with admission control for dynamic peer groups. Admission control is a necessary part of group communication. The scheme uses secret sharing to achieve integration of admission control and key agreement, and addresses the pre-requisite for key management. Identity-based cryptosystems are used for mutual authentication and key ...
متن کامل