A New Class of Product-sum Type Public Key Cryptosystem, K(V)ΣΠPKC, Constructed Based on Maximum Length Code

نویسنده

  • Masao Kasahara
چکیده

The author recently proposed a new class of knapsack type PKC referred to as K(II)ΣΠPKC [1]. In K(II)ΣΠPKC with old algorithm DA[I], Bob randomly constructs a very small subset of Alice’s set of public key whose order is very large, under the condition that the coding rate ρ satisfies 0.01 < ρ < 0.2. In K(II)ΣΠPKC, no secret sequence such as super-increasing sequence or shifted-odd sequence but the sequence whose components are constructed by a product of the same number of many prime numbers of the same size, is used. In this paper we present a new algorithm, DA(II) for decoding K(II)ΣΠPKC. We show that with new decoding algorithm, DA(II), K(II)ΣΠPKC yields a higher coding rate and a smaller size of public key compared with K(II)ΣΠPKC using old decoding algorithm, DA(I). We further present a generalized version of K(II)ΣΠPKC, referred to as K(V)ΣΠPKC. We finally present a new decoding algorithm DA(III) and show that, in K(V)ΣΠPKC with DA(III), the relation, rF ∼= 0, ρ ∼= 23 holds, where rF is the factor ratio that will be defined in this paper. We show that K(V)ΣΠPKC yields a higher security compared with K(II)ΣΠPKC. keyword Public-key cryptosystem(PKC), Product-sum type PKC, Knapsack-type PKC, LLL algorithm, PQC.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)ΣΠPKC, Constructed Based on Maximum Length Code

Abstract In this paper, we present a new class of knapsack type PKC referred to as K(II)ΣΠPKC. In K(II)ΣΠPKC, Bob randomly constructs a very small subset of Alice’s set of public key whose order is very large, under the condition that the coding rate ρ satisfies 0.01 < ρ < 0.5. In K(II)ΣΠPKC, no secret sequence such as super-increasing sequence or shifted-odd sequence but the sequence whose com...

متن کامل

New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC

In this paper, we present new classes of public key cryptosystem over F28 based on Reed-Solomon codes, referred to as K(XVII)SE(1)PKC and K(XVII)ΣΠPKC, a subclass of K(XVII)SE(1)PKC. We show that K(XV II)SE(1)PKC over F28 can be secure against the various attacks. We also present K(XVII)ΣΠPKC over F28 , a subclass of K(XVII)SE(1)PKC. We show that any assertion of successfull attack on K(XVII)SE...

متن کامل

Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes

This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic methods show that the improved cryptosystem has a significant security advantage over Ra...

متن کامل

EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...

متن کامل

A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC. – Along with a presentation of K(XII)SE(1)PKC over the extension field

In this paper, we present a new class of public key cryptosystem based on Reed-Solomon codes, a member of the code based PKC(CBPKC), referred to as K(XII)SE(1)PKC. We show that K(XII)SE(1)PKC can be secure against the various attacks. Particularly we present a member of K(XII)SE(1)PKC constructed based on the Reed-Solomon code over the extension field F28 , which is extensively used in the pres...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013