2009
DOI: 10.1007/s11460-009-0024-z
|View full text |Cite
|
Sign up to set email alerts
|

Fast public-key encryption scheme based on Chinese remainder theorem

Abstract: Traditional public-key cryptosystems suffer from a relatively low encryption/decryption speed, which hampers their applications in resource-constrained environments. A fast public-key cryptosystem is proposed to remedy this drawback. The new algorithm uses Chinese remainder theorem to hide the trapdoor information. The encryption of the system only carries out several modular multiplication operations, and the decryption only needs a modular multiplication and a low-dimensional matrixvector multiplication, whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…These factors could be carefully designed to get less impact on the efficiency of our method. In general, computing the Chines Reminder Theorem solution is efficient compared to other cryptography methods used in cryptography access control as it uses simple modulus operations without exponential operation (Wang, Wei and Hu 2009).…”
Section: Discussionmentioning
confidence: 99%
“…These factors could be carefully designed to get less impact on the efficiency of our method. In general, computing the Chines Reminder Theorem solution is efficient compared to other cryptography methods used in cryptography access control as it uses simple modulus operations without exponential operation (Wang, Wei and Hu 2009).…”
Section: Discussionmentioning
confidence: 99%
“…In this section, we describe the two cryptosystems with multiple intractability assumptions. For detailed information on the design, please refer to the papers [8,9].…”
Section: Wwwietdlorg 2 Description Of the Two Public Key Schemesmentioning
confidence: 99%
“…Some designers of cryptosystems think that a system based on multiple intractable problems should be more secure since these problems are very hard to be solved simultaneously. With this idea considered, two public key cryptosystems with two intractable problems, integer factorisation and simultaneous Diophantine approximation problems, mixed in their design were proposed by Hu in 2005 and2009, respectively, [8,9]. The simultaneous Diophantine approximation problem is, roughly speaking, a problem of finding n rational fractions with a same denominator to approximate, respectively, the given n real numbers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, to remedy this drawback, some fast public key cryptosystems have been proposed, including the NTRU cryptosystem which is based on algebraic structures of certain polynomial rings [6] and the Braid groups based cryptosystem [5]. Other research has investigated improving some strong existing public key cryptosystems, such as the RSA and the elliptic curve, using mathematical techniques and computational algorithms [13,17].…”
Section: Introductionmentioning
confidence: 99%