Improving Key Generation in matrix implementation of NTRU

Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,225

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

NCNIEE02_121

تاریخ نمایه سازی: 29 بهمن 1392

Abstract:

The lattice based cryptography, firstly presented by Ajtai, is based on the public key cryptosystems and its security is based on the worst-case-problem. One of the strong versionsof lattice based cryptography is NTRU which was proposed according to ring theory and later Nayak et al presented thematrix implementation of NTRU. Their implemented method had a problem in key generation part which was related to the limitations of generating key. Xu-Ren Luo presented a newmethod for finding the inverse of matrix and removed the limitation of key generation but again a problem in keygeneration was found. Since the key generation process is done after the encryption of the message, the same plaintext can notbe deduced during the decryption process. In this paper wediscuss about the current problem and two promising methods for solving and improving this problem are proposed

Keywords:

Authors

Massoud Sokouti

Department of Electrical and Computer Engineering, Shahid Beheshti University, Tehran, Iran

Ali Zakerolhosseini

Department of Electrical and Computer Engineering, Shahid Beheshti University, Tehran, Iran

Babak Sokouti

Biotechnology Research Center Tabriz University of Medical Sciences, Tabriz, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • J. Hoffstein, J. Pipher, and J.H. Silverman, _ Introduction o ...
  • _ _ _ _ Application of Cryptographic Techniques Konstanz, Germany, ...
  • E. Jaulmes and A. Joux, _ Chosen-C iphertext Attack against ...
  • T. E. Seidel, D. Socek, and M. Sramka, "Parallel Symmetric ...
  • D. Han, et al, Key recovery attacks _ NTRU without ...
  • A. May, Cryptanalysis of NTRU, unpublished paper, 1999. ...
  • P. Q, Nguyen and D. Pointcheval, "Analysis and Improvements of ...
  • D. Micciancio and S. Goldwasser, "Complexity of LatticeProb lems: a ...
  • N. H ow grave-graham, et al., On estimating the lattice ...
  • D. V. Bailey, D. Coffin, A. Elbirt, J. H. Silverman ...
  • R. Nayak, C. V. Sastry and J. Pradhan, _ matrix ...
  • R. Nayak, C. V. Sastry and J. Pradhan, "Algorithmic Comparison ...
  • X.-R. Luo and C.-H. Jerry Lin, "Discussion on Matrix NTRU, ...
  • J. Hoffistein, J. Pipher, and J. Silverman, "NTRU: A new ...
  • J. Pipher and NTRU Cryptosystems, Lectures on the NTRC encryption ...
  • R. Kouzmenko, Generalizations of the NTRU cryptosystem, Master's thesis, Polytechnique, ...
  • J. Hoffstein, D. Lieman, J. Silverman :Polynomial Rings and Efficient ...
  • نمایش کامل مراجع