Improving Key Generation in matrix implementation of NTRU

سال انتشار: 1392
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,224

فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

NCNIEE02_121

تاریخ نمایه سازی: 29 بهمن 1392

چکیده مقاله:

The lattice based cryptography, firstly presented by Ajtai, is based on the public key cryptosystems and its security is based on the worst-case-problem. One of the strong versionsof lattice based cryptography is NTRU which was proposed according to ring theory and later Nayak et al presented thematrix implementation of NTRU. Their implemented method had a problem in key generation part which was related to the limitations of generating key. Xu-Ren Luo presented a newmethod for finding the inverse of matrix and removed the limitation of key generation but again a problem in keygeneration was found. Since the key generation process is done after the encryption of the message, the same plaintext can notbe deduced during the decryption process. In this paper wediscuss about the current problem and two promising methods for solving and improving this problem are proposed

کلیدواژه ها:

نویسندگان

Massoud Sokouti

Department of Electrical and Computer Engineering, Shahid Beheshti University, Tehran, Iran

Ali Zakerolhosseini

Department of Electrical and Computer Engineering, Shahid Beheshti University, Tehran, Iran

Babak Sokouti

Biotechnology Research Center Tabriz University of Medical Sciences, Tabriz, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • J. Hoffstein, J. Pipher, and J.H. Silverman, _ Introduction o ...
  • _ _ _ _ Application of Cryptographic Techniques Konstanz, Germany, ...
  • E. Jaulmes and A. Joux, _ Chosen-C iphertext Attack against ...
  • T. E. Seidel, D. Socek, and M. Sramka, "Parallel Symmetric ...
  • D. Han, et al, Key recovery attacks _ NTRU without ...
  • A. May, Cryptanalysis of NTRU, unpublished paper, 1999. ...
  • P. Q, Nguyen and D. Pointcheval, "Analysis and Improvements of ...
  • D. Micciancio and S. Goldwasser, "Complexity of LatticeProb lems: a ...
  • N. H ow grave-graham, et al., On estimating the lattice ...
  • D. V. Bailey, D. Coffin, A. Elbirt, J. H. Silverman ...
  • R. Nayak, C. V. Sastry and J. Pradhan, _ matrix ...
  • R. Nayak, C. V. Sastry and J. Pradhan, "Algorithmic Comparison ...
  • X.-R. Luo and C.-H. Jerry Lin, "Discussion on Matrix NTRU, ...
  • J. Hoffistein, J. Pipher, and J. Silverman, "NTRU: A new ...
  • J. Pipher and NTRU Cryptosystems, Lectures on the NTRC encryption ...
  • R. Kouzmenko, Generalizations of the NTRU cryptosystem, Master's thesis, Polytechnique, ...
  • J. Hoffstein, D. Lieman, J. Silverman :Polynomial Rings and Efficient ...
  • نمایش کامل مراجع