2018
DOI: 10.1016/j.ins.2018.01.037
|View full text |Cite
|
Sign up to set email alerts
|

D-NTRU: More efficient and average-case IND-CPA secure NTRU variant

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(36 citation statements)
references
References 4 publications
0
36
0
Order By: Relevance
“…In spite of the big numbers, f and r, meeting (36) used in RCPKC, it guarantees that the decryption correctness condition (15) holds (see (39)) due to the use of Conditions (33), (36), (38), (46) and (50) instead of Conditions 7, (11), and (12), used in the original insecure CPKC (see Sections 3.3-3.3.2) considered in [26]. It was found that the insecurity of the original CPKC stems from the use of Conditions (7), (11) and (12), defining smaller than √ q numbers f , g, m, r meeting Minkowski's boundary (27) and the decryption correctness condition (15).…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…In spite of the big numbers, f and r, meeting (36) used in RCPKC, it guarantees that the decryption correctness condition (15) holds (see (39)) due to the use of Conditions (33), (36), (38), (46) and (50) instead of Conditions 7, (11), and (12), used in the original insecure CPKC (see Sections 3.3-3.3.2) considered in [26]. It was found that the insecurity of the original CPKC stems from the use of Conditions (7), (11) and (12), defining smaller than √ q numbers f , g, m, r meeting Minkowski's boundary (27) and the decryption correctness condition (15).…”
Section: Discussionmentioning
confidence: 99%
“…Since qLen > mgLen by definition (38), Succ OW RCPKC (A 1 , P ) decreases exponentially in qLen, and Assumption 1 holds. Similarly, the attacker can try the following methods with an exponentially decreasing success probability: Furthermore, the adversary can apply the GLR attack to get ( f , g).…”
Section: Rcpkc Asymmetric Encryption Padding and Its Ind-cca2 Securitymentioning
confidence: 98%
See 3 more Smart Citations