A new public key encryption scheme based on two cryptographic assumptions
Downloads
DOI:
https://doi.org/10.26637/mjm304/005Abstract
In this paper we present a new cryptosystem which is a combination of RSA variant namely rebalanced RSA-CRT and general formulation of DGDLP. Its security is depend upon integer factorization problem and general formulation of DGDLP.
Keywords:
public key cryptography, integer factorization problem, discrete logarithm problem, generalized discrete logarithm problem, cryptosystemMathematics Subject Classification:
94A60- Pages: 419-422
- Date Published: 01-10-2015
- Vol. 3 No. 04 (2015): Malaya Journal of Matematik (MJM)
D. Boneh and G. Durfee, New results on cryptanalysis of low private exponent RSA, Preprint, (1998), $1-18$. DOI: https://doi.org/10.1007/3-540-48910-X_1
D. Boneh and G. Durfee, Cryptanalysis of RSA with private key $d$ less than $N^{0.292}$, IEEE Trans. Information Theory, 46(4) (2000) 1339-1349. DOI: https://doi.org/10.1109/18.850673
D. Boneh and H. Shacham, Fast variants of RSA, CryptoBytes, 5(1) (2002), 1-9.
H. Elkamchouchi, K. Elshenawy and Heba. A. Shaban, Two new public key techniques in the domain of Gaussian integers, Twenteith National radio science conference(NRSC2003). In: Proceedings of Twenteith national, C17 (2003), 1-8. DOI: https://doi.org/10.1109/NRSC.2003.157337
H. M. Elkamchouchi, M. E. Nasr and R. Esmail, New public key techniques based on double discrete logarithm problem, $21^{text {st }}$ National radio science conference(NRSC2004). In: Proceeding of Twenty-First national, C23 (2004), 1-9. DOI: https://doi.org/10.1109/NRSC.2004.239775
L. Harn, Public-key cryptography design based on factoring and discrete logarithms, IEEE Proceedings, 141 : $3(1994)$ 193-195. DOI: https://doi.org/10.1049/ip-cdt:19941040
K. S. McCureley, A key distribution system equivalent to factoring, Journal of Cryptography, $1: 2$ (1988) 95-106. DOI: https://doi.org/10.1007/BF02351718
A. J. Menezes, P. C. Van O orshot and S. A. Vnstone, Handbook of Applied Cryptography, CRC Press, 1996.
D. Poulakis, A public key encryption scheme based on factoring and discrete logarithm, Journal of Discrete Mathematical Sciences and Cryptography, 12(6) (2009) 745-752. DOI: https://doi.org/10.1080/09720529.2009.10698270
M. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Information Theory, 36(3) (1990) 553-558. DOI: https://doi.org/10.1109/18.54902
- NA
Similar Articles
- Alaattin Esen, Orkun Tasbozan, Numerical solution of time fractional nonlinear Schrödinger equation arising in quantum mechanics by cubic B-spline finite elements , Malaya Journal of Matematik: Vol. 3 No. 04 (2015): Malaya Journal of Matematik (MJM)
You may also start an advanced similarity search for this article.
Metrics
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 MJM

This work is licensed under a Creative Commons Attribution 4.0 International License.