A new public key encryption scheme based on two cryptographic assumptions

Downloads

DOI:

https://doi.org/10.26637/mjm304/005

Abstract

In this paper we present a new cryptosystem which is a combination of RSA variant namely rebalanced RSA-CRT and general formulation of DGDLP. Its security is depend upon integer factorization problem and general formulation of DGDLP.

Keywords:

public key cryptography, integer factorization problem, discrete logarithm problem, generalized discrete logarithm problem, cryptosystem

Mathematics Subject Classification:

94A60
  • Pages: 419-422
  • Date Published: 01-10-2015
  • Vol. 3 No. 04 (2015): Malaya Journal of Matematik (MJM)

D. Boneh and G. Durfee, New results on cryptanalysis of low private exponent RSA, Preprint, (1998), $1-18$. DOI: https://doi.org/10.1007/3-540-48910-X_1

D. Boneh and G. Durfee, Cryptanalysis of RSA with private key $d$ less than $N^{0.292}$, IEEE Trans. Information Theory, 46(4) (2000) 1339-1349. DOI: https://doi.org/10.1109/18.850673

D. Boneh and H. Shacham, Fast variants of RSA, CryptoBytes, 5(1) (2002), 1-9.

H. Elkamchouchi, K. Elshenawy and Heba. A. Shaban, Two new public key techniques in the domain of Gaussian integers, Twenteith National radio science conference(NRSC2003). In: Proceedings of Twenteith national, C17 (2003), 1-8. DOI: https://doi.org/10.1109/NRSC.2003.157337

H. M. Elkamchouchi, M. E. Nasr and R. Esmail, New public key techniques based on double discrete logarithm problem, $21^{text {st }}$ National radio science conference(NRSC2004). In: Proceeding of Twenty-First national, C23 (2004), 1-9. DOI: https://doi.org/10.1109/NRSC.2004.239775

L. Harn, Public-key cryptography design based on factoring and discrete logarithms, IEEE Proceedings, 141 : $3(1994)$ 193-195. DOI: https://doi.org/10.1049/ip-cdt:19941040

K. S. McCureley, A key distribution system equivalent to factoring, Journal of Cryptography, $1: 2$ (1988) 95-106. DOI: https://doi.org/10.1007/BF02351718

A. J. Menezes, P. C. Van O orshot and S. A. Vnstone, Handbook of Applied Cryptography, CRC Press, 1996.

D. Poulakis, A public key encryption scheme based on factoring and discrete logarithm, Journal of Discrete Mathematical Sciences and Cryptography, 12(6) (2009) 745-752. DOI: https://doi.org/10.1080/09720529.2009.10698270

M. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Information Theory, 36(3) (1990) 553-558. DOI: https://doi.org/10.1109/18.54902

  • NA

Metrics

PDF views
78
Jan 2016Jul 2016Jan 2017Jul 2017Jan 2018Jul 2018Jan 2019Jul 2019Jan 2020Jul 2020Jan 2021Jul 2021Jan 2022Jul 2022Jan 2023Jul 2023Jan 2024Jul 2024Jan 2025Jul 2025Jan 20269
|

Published

01-10-2015

How to Cite

Pinkimani Goswami, Madan Mohan Singh, and Bubu Bhuyan. “A New Public Key Encryption Scheme Based on Two Cryptographic Assumptions”. Malaya Journal of Matematik, vol. 3, no. 04, Oct. 2015, pp. 419-22, doi:10.26637/mjm304/005.