Complexity measures for public-key cryptosystems
نویسنده
چکیده
A b s t r a c t The f i r s t p a r t of t h i s paper g i v e s r e s u l t s about promise problems. A "promise problem" i s a formulation of a p a r t i a l d e c i s i o n problem t h a t i s u s e f u l f o r d e s c r i b i n g cracking problems f o r public-key cryptosystems (PKCS). We prove t h a t every NP-hard promise problem i s uniformly NP-hard, and w e show t h a t a number of r e s u l t s and a c o n j e c t u r e about promise problems a r e e q u i v a l e n t t o s e p a r a b i l-i t y a s s e r t i o n s t h a t a r e t h e n a t u r a l analogues of well-known r e s u l t s i n c l a s s i c a l r e c u r s i o n theory. The c o n j e c t u r e , i f i t i s t r u e , i m p l i e s nonexistence of PKCS having NP-hard cracking problems. The second p a r t of t h e paper s t u d i e s more a p p r o p r i a t e measures f o r PKCS. Among t h e r e s u l t s obtained are t h e following: One-way f u n c t i o n s e x i s t i f and only i f P # such t h a t range f E P e x i s t i f and only i f U n CO-U # P. It w i l l follow t h a t t h e r e e x i s t PKCS t h a t cannot be cracked i n polynomial t i m e …
منابع مشابه
Efficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملPublic-key cryptography and invariant theory
Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of known cryptosystems which involve groups.
متن کاملNonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
It is widely believed to take exponential time to find a solution of a system of random multivariate polynomials because of the NP-completeness of such a task. On the other hand, in most of multivariate public key cryptosystems proposed so far, the computational complexity of cryptanalysis is apt to be polynomial time due to the trapdoor structure. In this paper, we develop the concept, piece i...
متن کاملSecure and Fast Digital Signatures using BCH Codes
Since the introduction of public key cryptography in the 70’s [1], many cryptosystems have been proposed and many cryptographic schemes have been broken. The most used cryptosystems rely on number theory problem like the factorization problem [3] and the discrete logarithm over suitable group [2]. The McEliece cryptosystem [5] and the Neiderreiter variante [6] rely on coding theory, they are on...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- SIAM J. Comput.
دوره 17 شماره
صفحات -
تاریخ انتشار 1984