New public-key cryptosystems with fast decryption

نویسنده

  • Tsuyoshi Takagi
چکیده

ii iii Acknowledgements First of all, I would like to thank Prof. Johannes Buchmann for giving me the opportunity to join his research group, organizing the joint research between TUD and NTT, and promoting this doctor thesis as my supervisor. His suggestions and helpful support improve this work significantly. I would also like to thank Prof. Kouichi Sakurai for accepting the task of the second referee. He gives me several important comments for this doctor thesis. Finally I wish to thank my family and friends, especially my wife Julia, for all their encouragement and support, without which I would never have completed this work. page GoToMaxOrder algorithm Cl(∆ q) → Cl(∆ 1) 10 Inverse algorithm Cl(∆ 1) → Cl(∆ q) 11 Reduction reduction algorithm Red ∆ 18 PkQ Decryption decryption of the PkQ cryptosystem 31 Nk Decryption decryption of the Nk cryptosystem 36 Nk Rabin Decryption decryption of the Nk Rabin cryptosystem 42 ix x CONTENTS Chapter 1 Preface This thesis is about the construction, analysis and implementation of efficient public-key cryptosystems. The public-key cryptosystem which is used most frequently throughout the world is the RSA cryptosystem [RSA78] [PKCS]. As an alternative to the RSA cryptosystem, elliptic curve cryptosystems have been introduced [Kob87] [Mil86]. Here we are interested in constructing new public-key cryptosystems which are different from both the RSA cryptosystem and elliptic curve cryptosystems. The theoretical foundation for the construction of a public-key cryptosystem is the following statement: A public-key cryptosystem has an encryption function E and a decryption function D which are published for all persons. Each person has a public key e and the corresponding secret key d. When person B wishes to send a message m to person A, then B uses the public-key e A of A to encrypt m: c = E e A (m), E : a encryption function with e A. (1.1) Ciphertext c is sent to person B possibly through an open network. Then person A decrypts the ciphertext c using the secret key d A which only person A knows: m = D d A (c), D : a decryption function with d A. (1.2) Here we have the relationship m = D d A (E e A (m)). All persons can compute E e A (·) using the public key e A , but the only person who can execute D d A (·) is A. Using this mechanism, …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

A new public - key cryptosystem over quadratic orderswith quadratic decryption timeSachar

We present a new cryptosystem based on ideal arithmetic in quadratic orders. The method of our trapdoor is diierent from the Diie-Hellman key distribution scheme or the RSA cryp-tosystem. The plaintext m is encrypted by mp r , where p is a xed element and r is a random integer, so our proposed cryptosystem is a probabilistic encryption scheme and has the ho-momorphy property. The most prominent...

متن کامل

Secure and Fast Digital Signatures using BCH Codes

Since the introduction of public key cryptography in the 70’s [1], many cryptosystems have been proposed and many cryptographic schemes have been broken. The most used cryptosystems rely on number theory problem like the factorization problem [3] and the discrete logarithm over suitable group [2]. The McEliece cryptosystem [5] and the Neiderreiter variante [6] rely on coding theory, they are on...

متن کامل

Multivariate Quadratic Trapdoor Functions Based on Multivariate Quadratic Quasigroups

We have designed a new class of multivariate quadratic trapdoor functions. The trapdoor functions are generated by quasigroup string transformations based on a class of quasigroups called multivariate quadratic quasigroups (MQQ). The public key schemes using these trapdoor functions are bijective mappings, they do not perform message expansions and can be used both for encryption and signatures...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001