Cryptanalysis of an ElGamal-like cryptosystem based on matrices over group rings

来源 :第十二届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:jimgui19810917
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  ElGamal cryptography is one of the most important Public Key Cryptography(PKC)since Diffie-hellman exchangs was proposed,however these PKCs which are based on the hard problems that dis-crete logarithm problem and integer factorization problem are weak with advances in quantum computers.So some alternatives should be pro-posed.Majid Khan et al.proposed two ElGamal-like public-key encryp-tion schemes based on large abelian subgroup of general linear group over a residue ring,however the two schcmes were not long before it was proved unsafe by us.Then,Saba Inam and Rashid(2016)proposed an improved cryptosystem which can resist my attack on "NEURAL COMPUTING & APPLICATIONS".By analyzing the security of the public key cryptography,we propose an improved method of algebraic kcy-rccovcry attack in the polynomial computational complexity dcspitc-ing the designers claim the cryptosystem is optimal security.Besides,we provide corresponding practical attack example to illustrate the at-tack method in our cryptanalysis,which breaks instances claiming 80 bits of security less than one minute on a single desktop computer.
其他文献
There are privacy leakage risks and degradation of performance when verifying the integrity of components with existing methods in a cloud.To address the issue,this work proposes a structural integrit
低轨卫星网络具有覆盖范围广、通信功耗小、机动性高等优势,能够作为地基网络的补充网络为海洋、沙漠和深山等地形复杂的区域提供网络服务。针对由低轨卫星网络信道开放、网络拓扑结构动态变化和用户终端海量特点,导致的安全问题、服务质量问题和网络控制中心负载问题,本文提出了一种基于Token 的动态接入认证协议,基于卫星轨迹可预测性和时钟高度同步的特点构造预认证向量,实现了用户的随遇接入和无缝切换。详细的仿真分
Mobile cloud computing(MCC)is becoming an important way of data sharing.It is of great value for people to store and retrieve personal data at anytime and anywhere.Attribute-based encryption(ABE)can s
Searching over encrypted data is a critical operation to enforce the encryption-before-outsourcing mechanism,which is a fundamental solution to protect data privacy in the untrusted cloud environment.
针对数据库驱动的认知无线电网络(Cognitive Radio Networks,CRNs)中存在的严重的位置隐私泄露问题,本文提出了一种基于SpaceTwist 的隐私保护方案。该方案借助查询服务器,以锚点为中心向数据库展开增量近邻查询,以获得锚点周围的主用户可用信道。数据库将查询结果返回给查询服务器,查询服务器根据最大传输功率公式判断次用户周围可用的信道,并根据次用户允许发送的功率进行信道分配
Traditional voting schemes are used for the credit evaluation and authentication.During the voting process,the contents need to be verified through the signature algorithms.Traditional signature schem
With the explosive development of the mobile Internet,the security threats faced by the mobile Internet have grown rapidly in recent years.Since the normal operation of the mobile Internet depends on
Aim to improve the detection accuracy,anovel peer-to-peerbotnet detection method based on permutation entropy and adaptive information fusion algorithm was proposed.Permutation entropy was utilized to
Trusted access to the Internet of Things sensing layer node is the precondition for the trusted operation of the Internet of Things.How to quickly and accurately implement identity authentication of a
Identity-Based Proxy Re-Encryption(IB-PRE)is a cryptographic primitive that permits a semi-trusted proxy to convert the ciphertext encrypted under Alices identity into Bobs ciphertext of the same mess