A new public key encryption scheme based on two cryptographic assumptions

Downloads

DOI:

https://doi.org/10.26637/mjm304/005

Abstract

In this paper we present a new cryptosystem which is a combination of RSA variant namely rebalanced RSA-CRT and general formulation of DGDLP. Its security is depend upon integer factorization problem and general formulation of DGDLP.

Keywords:

public key cryptography, integer factorization problem, discrete logarithm problem, generalized discrete logarithm problem, cryptosystem

Mathematics Subject Classification:

94A60
  • Pages: 419-422
  • Date Published: 01-10-2015
  • Vol. 3 No. 04 (2015): Malaya Journal of Matematik (MJM)

D. Boneh and G. Durfee, New results on cryptanalysis of low private exponent RSA, Preprint, (1998), $1-18$. DOI: https://doi.org/10.1007/3-540-48910-X_1

D. Boneh and G. Durfee, Cryptanalysis of RSA with private key $d$ less than $N^{0.292}$, IEEE Trans. Information Theory, 46(4) (2000) 1339-1349. DOI: https://doi.org/10.1109/18.850673

D. Boneh and H. Shacham, Fast variants of RSA, CryptoBytes, 5(1) (2002), 1-9.

H. Elkamchouchi, K. Elshenawy and Heba. A. Shaban, Two new public key techniques in the domain of Gaussian integers, Twenteith National radio science conference(NRSC2003). In: Proceedings of Twenteith national, C17 (2003), 1-8. DOI: https://doi.org/10.1109/NRSC.2003.157337

H. M. Elkamchouchi, M. E. Nasr and R. Esmail, New public key techniques based on double discrete logarithm problem, $21^{text {st }}$ National radio science conference(NRSC2004). In: Proceeding of Twenty-First national, C23 (2004), 1-9. DOI: https://doi.org/10.1109/NRSC.2004.239775

L. Harn, Public-key cryptography design based on factoring and discrete logarithms, IEEE Proceedings, 141 : $3(1994)$ 193-195. DOI: https://doi.org/10.1049/ip-cdt:19941040

K. S. McCureley, A key distribution system equivalent to factoring, Journal of Cryptography, $1: 2$ (1988) 95-106. DOI: https://doi.org/10.1007/BF02351718

A. J. Menezes, P. C. Van O orshot and S. A. Vnstone, Handbook of Applied Cryptography, CRC Press, 1996.

D. Poulakis, A public key encryption scheme based on factoring and discrete logarithm, Journal of Discrete Mathematical Sciences and Cryptography, 12(6) (2009) 745-752. DOI: https://doi.org/10.1080/09720529.2009.10698270

M. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Information Theory, 36(3) (1990) 553-558. DOI: https://doi.org/10.1109/18.54902

  • NA

Metrics

Metrics Loading ...

Published

01-10-2015

How to Cite

Pinkimani Goswami, Madan Mohan Singh, and Bubu Bhuyan. “A New Public Key Encryption Scheme Based on Two Cryptographic Assumptions”. Malaya Journal of Matematik, vol. 3, no. 04, Oct. 2015, pp. 419-22, doi:10.26637/mjm304/005.