A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations(Public Key Cryptography)(<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over F_2. However most of the proposed public key cryptosystems based on multivariate polynomials, are proved not secure. In this paper, we propose several types of new constructions of public key cryptosystems based on randomly generated singular simultaneous equations. One of the features of the proposed cryptosystems is that the sets of random singular simultaneous equations significantly enlarges the size of the transformation.
- 社団法人電子情報通信学会の論文
- 2005-01-01
著者
-
KASAHARA Masao
Faculty of Informatics, Osaka Gakuin University
-
Sakai Ryuichi
Department Of Growth Factor Division National Cancer Center Research Institute
-
Kasahara Masao
Faculty Of Informatics Osaka Gakuin University
-
Sakai Ryuichi
Department Of Electronics And Information Science Kyoto Institute Of Technology
関連論文
- Effects of lectin in the scleractinian coral Ctenactis echinata on symbiotic zooxanthellae
- Characterization of L-amino acid oxidase and antimicrobial activity of aplysianin A, a sea hare-derived antitumor-antimicrobial protein
- On Ambiguity in Coppersmith' Attacking Method against NIKS-TAS Scheme (Special Section on Cryptgraphy and Information Security)
- A New Traitor Tracing
- Isolation and Characterization of a D-Galactose-binding Lectin from the Acorn Barnacle Balanus rostratus
- Suppression of gastric cancer dissemination by ephrin-B1-derived peptide
- A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness(Public Key Cryptography, Cryptography and Information Security)
- A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme (Asymmetric Cipher) (Cryptography and Information Security)
- New Key Generation Algorithm for RSA Cryptosystem (Special Section on Cryptography and Information Security)
- On the Unequal Error Protection Capability of a q-Ary Image 0f a L0W-Rate q^m-Ary Cyclic Code (Special Section on Information Theory and Its Applications)
- A New Attacking Method Based on Virtual Linear Transformation
- A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations(Public Key Cryptography)(Cryptography and Information Security)
- A Construction of Public-Key Cryptosystem Based on Algebraic Coding and Random Coding
- An ID-based key sharing scheme based on discrete logarithm problem over a product of three primes