Computer Science – Cryptography and Security
Scientific paper
2008-01-31
Computer Science
Cryptography and Security
11 pages, 2 tables, and submitted to IEEE Transactions on Information Theory
Scientific paper
This paper gives the definitions of a nonnormal super-increasing sequence and a nonnormal subset sum separately, proves the two properties of a nonnormal super-increasing sequence, and proposes the REESSE2+ public-key encryption scheme which includes the three algorithms for key generation, encryption and decryption. The paper discusses the necessity and sufficiency of the lever function for preventing the Shamir extremum attack, analyzes the security of REESSE2+ against extracting a private key from a public key through the exhaustive search, recovering a plaintext from a ciphertext plus a knapsack of high density through the LLL lattice basis reduction method, and heuristically obtaining a plaintext through the meet-in-the-middle attack or the adaptive-chosen-ciphertext attack. The authors evaluate the time complexity of the REESSE2+ algorithms, compare REESSE2+ with ECC and NTRU, and find that the encryption speed of REESSE2+ is ten thousand times faster than ECC and NTRU bearing the matchable security, and the decryption speed of REESSE2+ is roughly equivalent to ECC and NTRU respectively.
Hu Jun
Huang Zunguo
Lu Shuwang
Su Shenghui
No associations
LandOfFree
The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-204101