A Pre - Computation Scheme for Speeding Up Public - Key Cryptosystems

نویسنده

  • Victor Boyko
چکیده

This thesis presents fast and practical methods for generating randomly distributed pairs of the form (x, gX mod p) or (x, xe mod N), using precomputation. These generation schemes are of wide applicability for speeding-up public key systems that depend on exponentiation and offer a smooth memory-speed trade-off. The steps involving exponentiation in these systems can be reduced significantly in many cases. The schemes are most suited for server applications. The thesis also presents security analyses of the schemes using standard assumptions. The methods are novel in the sense that they identify and thoroughly exploit the randomness issues related to the instances generated in these public-key schemes. The constructions use random walks on Cayley (expander) graphs over Abelian groups. Thesis Supervisor: Shafi Goldwasser Title: Professor of Computer Science Acknowledgments I would like to start by expressing my deepest gratitude to Shafi Goldwasser, my thesis advisor, for her continued advice and fruitful discussions. She has been very helpful and supporting throughout my time at MIT, and I look forward to further work with her. The work for this thesis was performed in part at Bellcore under the direction of and in collaboration with Ramarathnam Venkatesan. I would like to thank Marcus Peinado for investigating the hidden subset sum problems related to our generators, and for collaborating on the conference version of our paper. I would also like to thank Ronald Rivest and Arjen Lenstra for their help, advice, and discussions. Finally, I would like to thank my parents for making me possible, and for their constant love and encouragement.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Construction of Extended Multivariate Public Key Cryptosystems

Based on the ideas: “invertible cycle”, “tame transformation” and “special oil and vinegar”, three different nonlinear invertible transformations were constructed separately. Then making use of the idea of the extended multivariate public key cryptosystem, and combining the nonlinear invertible transformations above with Matsumoto-Imai (MI) scheme, three methods of designing extended multivaria...

متن کامل

Integration of Admission Control and Group Key Agreement

In this paper we present an authenticated group key agreement scheme with admission control for dynamic peer groups. Admission control is a necessary part of group communication. The scheme uses secret sharing to achieve integration of admission control and key agreement, and addresses the pre-requisite for key management. Identity-based cryptosystems are used for mutual authentication and key ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009