UPM Institutional Repository

A new cryptosystem analogous to LUCELG and Cramer-Shoup


Citation

Muslim, Norliana and Md. Said, Mohamad Rushdan (2009) A new cryptosystem analogous to LUCELG and Cramer-Shoup. International Journal of Cryptology Research, 1 (2). pp. 191-204. ISSN 1985-5753

Abstract

A special group based on a linear recurrence equation plays an important role in modern cryptography. Its relation appeared differently in various cryptosystem. Some cryptosystems that use this linear recurrence property are LUC, LUCDIF, and LUCELG but the first practical Lucas function in a cryptosystem is LUC, presented by Peter Smith and Michael Lennon in 1993. Cramer-Shoup is a practical public key cryptosystem provably secure against adaptive chosen ciphertext attack that requires a universal one-way hash function. Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. Since the encryption and decryption algorithm of a new cryptosystem is based on the defined Lucas function, it is believed that the security of Lucas function is polynomial-time equivalent to the generalized discrete logarithm problems. Moreover, the new cryptosystem is secure against adaptive chosen ciphertext attack by assuming that the hash function is chosen from a universal one-way family and the Diffie-Hellm an decision problem is hard in the finite field.


Download File

[img]
Preview
PDF (Abstract)
A new cryptosystem analogous to LUCELG and Cramer.pdf

Download (84kB) | Preview
Official URL or Download Paper: http://www.mscr.org.my/V1(2)/PP%20191-204.pdf

Additional Metadata

Item Type: Article
Divisions: Faculty of Science
Institute for Mathematical Research
Publisher: Malaysian Society for Cryptology Research
Keywords: Lucas function; Public key cryptosystem; Discrete log problem; Adaptive chosen ciphertext attack; Hash function
Depositing User: Nurul Ainie Mokhtar
Date Deposited: 29 May 2015 06:58
Last Modified: 23 Oct 2015 02:35
URI: http://psasir.upm.edu.my/id/eprint/12742
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item