New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)

New Cryptosystem Using Multiple Cryptographic Assumptions (Report‪)‬

Journal of Computer Science 2011, Dec, 7, 12

    • 5,99 $
    • 5,99 $

Description de l’éditeur

INTRODUCTION Many designated cryptosystems (Diffie and Hellman, 1976) in the literature were developed based on a single cryptographic assumption like algebraic geometric code (Pramod and Manju, 2010), discrete logarithms (DL) (ElGamal, 1985), factorization (FAC) (Rivest et al., 1978), quadratic residue (QR) (Rabin, 1979), elliptic curve discrete logarithm (ECDL) (Koblitz, 1987; Miller, 1986) problems. Some of them remain secure and are resistant to attacks. However, one day in the future, one could find a polynomial algorithm that can efficiently solve the underlying assumption hence break the corresponding cryptosystem easily. Many cryptographers realize it and start to develop a more secure cryptosystem. One of the methods to design such scheme is by using multiple cryptographic assumptions (Ismail et al., 2008a; Elkamchouchi et al., 2004; Harn, 1994; Baocang and Yupu, 2005; Ismail et al., 2008b; Ismail and Hijazi, 2011). The reason behind this is an adversary needs a longer period of time in order to break the multiple cryptographic assumptions-based cryptosystem since it is very unlikely for the adversary to obtain the solutions of these cryptographic assumptions simultaneously.

GENRE
Informatique et Internet
SORTIE
2011
1 décembre
LANGUE
EN
Anglais
LONGUEUR
10
Pages
ÉDITEUR
Science Publications
VENDEUR
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
TAILLE
163,1
 ko
Practical Signcryption Practical Signcryption
2010
Cryptography and Cryptanalysis in Java Cryptography and Cryptanalysis in Java
2022
Secure Searchable Encryption and Data Management Secure Searchable Encryption and Data Management
2021
Pro Cryptography and Cryptanalysis with C++20 Pro Cryptography and Cryptanalysis with C++20
2021
Cryptography and Cryptanalysis in MATLAB Cryptography and Cryptanalysis in MATLAB
2021
Lattice-Based Cryptosystems Lattice-Based Cryptosystems
2020
Fast Algorithms for Outlier Detection. Fast Algorithms for Outlier Detection.
2008
E-Government Architecture in Jordan: A Comparative Analysis. E-Government Architecture in Jordan: A Comparative Analysis.
2006
Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report) Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report)
2009
Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report) Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report)
2011
Exploring the Relationship Between Cohesion and Complexity. Exploring the Relationship Between Cohesion and Complexity.
2005
A New Filtering Algorithm for Duplicate Document Based on Concept Analysis. A New Filtering Algorithm for Duplicate Document Based on Concept Analysis.
2006