Abstract
In this paper, we suggest a novel public key scheme by incorporating the twisted Edwards model of elliptic curves. The security of the proposed encryption scheme depends on the hardness of solving elliptic curve version of discrete logarithm problem and Diffie-Hellman problem. It then ensures secure message transmission by having the property of one-wayness, indistinguishability under chosen-plaintext attack (IND-CPA) and indistinguishability under chosen-ciphertext attack (IND-CCA). Moreover, we introduce a variant of Nyberg-Rueppel digital signature algorithm with message recovery using the proposed encryption scheme and give some countermeasures to resist some wellknown forgery attacks.
(Communicated by Milan Paštéka )
References
[1] Abe, M.—Okamoto, T.: A signature scheme with message recovery as secure as discrete logarithm. Advances in Cryptology - Asiacrypt’99, Lecture Notes in Comput. Sci. 1716, 1999, pp. 378–389.10.1007/978-3-540-48000-6_30Suche in Google Scholar
[2] Akleylek, S.—Kirlar, B. B.: New methods for public key cryptosystems based on XTR, Security and Communication Networks 8(18) (2015), 3682–3689.10.1002/sec.1291Suche in Google Scholar
[3] Antipa, A.—Brown, D. R. L.—Gallant, R. P.—Lambert, R. J.—Struik, R.—Vanstone, S. A.: Accelerated verification of ECDSA signatures. Selected Areas in Cryptography - SAC 2005, Lecture Notes in Comput. Sci. 3897, 2006, pp. 307–318.10.1007/11693383_21Suche in Google Scholar
[4] Ashraf, M.—Kirlar, B. B.: Message transmission for GH-public key cryptosystem, Int. J. Comput. Appl. Math. 259-B (2014), 578–585.10.1016/j.cam.2013.10.005Suche in Google Scholar
[5] Avanzi, R. M.: The complexity of certain multi-exponentiation techniques in cryptography, J. Cryptology 18 (2014), 357–373.10.1007/s00145-004-0229-5Suche in Google Scholar
[6] Bernstein, D.—Lange, T.: Faster addition and doubling on elliptic curves. Advances in Cryptology - Asiacrypt 2007, Lecture Notes in Comput. Sci. 4833, 2007, pp. 29–50.10.1007/978-3-540-76900-2_3Suche in Google Scholar
[7] Bernstein, D.—Birkner, P.—Joye, M.—Lange, T.—Peters, C.: Twisted Edwards curves, Progress in Cryptology - Africacrypt 2008, Lecture Notes in Comput. Sci. 5023, 2008, pp. 389–405.10.1007/978-3-540-68164-9_26Suche in Google Scholar
[8] Catalano, D.—Cramer, R.—Damgard, I.—Crescenzo, G. D.—Pointcheval, D.—Takagi, T.: Contemporary Cryptology. Advanced Courses in Mathematics, 2005.10.1007/3-7643-7394-6Suche in Google Scholar
[9] Doche, C.: Exponentiation. In: Handbook of elliptic and hyperelliptic curve cryptography (H. Cohen, G. Frey, eds.), CRC Press, Boca Raton, 2005, pp. 145–168.10.1201/9781420034981Suche in Google Scholar
[10] Dolev, D.—Dwork, C.—Naor, M.: Non-malleable cryptography. Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991, pp. 542–552.10.1145/103418.103474Suche in Google Scholar
[11] Edwards, H.: A normal form for elliptic curves, Bull. Amer. Math. Soc. 44(3) (2007), 393–422.10.1090/S0273-0979-07-01153-6Suche in Google Scholar
[12] ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory 31(4) (1985), 469–472.10.1007/3-540-39568-7_2Suche in Google Scholar
[13] Ergün, S.—Kirlar, B. B.—Alparslan Gök, S. Z.—Weber, G.-W.: An application of crypto cloud computing in social networks by cooperative game theory, J. Ind. Manag. Optim. 16(4) (2020), 1927–1941.10.3934/jimo.2019036Suche in Google Scholar
[14] Goldwasser, S.—Micali, S.: Probabilistic encryption, J. Comput. System Sci. 28 (1984), 270–299.10.1016/0022-0000(84)90070-9Suche in Google Scholar
[15] Gong, G.—Harn, L.—Wu, H.: The GH public-key cryptosystem. Selected Areas in Cryptography - SAC’01, Lecture Notes in Comput. Sci. 2259, 2001, pp. 284–300.10.1007/3-540-45537-X_22Suche in Google Scholar
[16] Hisil, H.—Koon-Ho Wong—K., Carter, G.—Dawson, E.: Twisted Edwards curves revisited. Advances in Cryptology - Asiacrypt 2008, Lect. Notes in Comp. Sci. 5350, 2008, 326–343.10.1007/978-3-540-89255-7_20Suche in Google Scholar
[17] Johnson, D.—Menezes, A.—Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA), International Journal of Information Security 1(1) (2001), 36–63.10.1007/s102070100002Suche in Google Scholar
[18] Kirlar, B. B.—Cil, M.: On the k-th order LFSR sequence with public key cryptosystems, Math. Slovaca 67(3) (2017), 601–610.10.1515/ms-2016-0294Suche in Google Scholar
[19] Kirlar, B. B.—Ergün, S.—Alparslan Gök, S. Z.—Weber, G.-W.: A game-theoretical and cryptographical approach to crypto-cloud computing and its economical and financial aspects, Ann. Oper. Res. 260 (2018), 217–231.10.1007/s10479-016-2139-ySuche in Google Scholar
[20] Lenstra, A. K.—Verheul, E. R.: The XTR public key system. Advances in Cryptology - Crypto’00, Lecture Notes in Comput. Sci. 1880, 2000, pp. 1–19.10.1007/3-540-44598-6_1Suche in Google Scholar
[21] Lim, C.—Lee, P.: A key recovery attack on discrete log-based schemes using a prime order subgroup. Advances in Cryptology - Crypto’97, Lecture Notes in Comput. Sci. 1294, 1997, pp. 249–263.10.1007/BFb0052240Suche in Google Scholar
[22] Menezes, A.—Ustaoglu, B.: On reusing ephemeral keys in Diffie-Hellman key agreement protocols, Int. J. Appl. Cryptogr. 2(2) (2010), 154–158.10.1504/IJACT.2010.038308Suche in Google Scholar
[23] Miyaji, A.: Weakness in message recovery signature schemes based on discrete logarithm problems 1. IEICE Japan Tech. Rep., ISEC95-7, 1995.Suche in Google Scholar
[24] Muratovic-Ribic, A.—Wang, Q.: Partitions and compositions over finite fields, Electron. J. Combin. 20(1) (2013), 1–14.10.37236/2678Suche in Google Scholar
[25] NIST SP 800-56A Special Publication 800-56A: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography,. National Institute of Standards and Technology, 2007.Suche in Google Scholar
[26] Nyberg, K.—Rueppel, R. A.: A new signature scheme based on the DSA giving message recovery. 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, 1993, pp. 58–61.10.1145/168588.168595Suche in Google Scholar
[27] Nyberg, K.—Rueppel, R. A.: Message recovery for signature schemes based on the discrete logarithm problem, Codes and Cryptography 7(1–2) (1996), 61–81.10.1007/BFb0053434Suche in Google Scholar
[28] Stam, M.—Lenstra, A.: Speeding up XTR. Advances in Cryptology - Asiacrypt’01, Lecture Notes in Comput. Sci. 2248, 2001, pp. 125–143.10.1007/3-540-45682-1_8Suche in Google Scholar
© 2020 Mathematical Institute Slovak Academy of Sciences
Artikel in diesem Heft
- Regular papers
- Fuzzy deductive systems of RM algebras
- Congruence pairs of principal MS-algebras and perfect extensions
- The lattices of 𝔏-fuzzy state filters in state residuated lattices
- Central lifting property for orthomodular lattices
- EQ-Modules
- On the exponential Diophantine equation Pxn + Pxn+1 + ⋯ + Pxn+k-1 = Pm
- Remarks on some generalization of the notion of microscopic sets
- Disjointness of composition operators on Hv0 spaces
- A common fixed point theorem for non-self mappings in strictly convex menger PM-spaces
- The Poincaré-Cartan forms of one-dimensional variational integrals
- Coarse cohomology with twisted coefficients
- Divisible extension of probability
- Asymptotic behavior of the records of multivariate random sequences in a norm sense
- Strong convergence of the functional nonparametric relative error regression estimator under right censoring
- A new kumaraswamy generalized family of distributions: Properties and applications
- Efficient message transmission via twisted Edwards curves
- Computation of several Hessenberg determinants
Artikel in diesem Heft
- Regular papers
- Fuzzy deductive systems of RM algebras
- Congruence pairs of principal MS-algebras and perfect extensions
- The lattices of 𝔏-fuzzy state filters in state residuated lattices
- Central lifting property for orthomodular lattices
- EQ-Modules
- On the exponential Diophantine equation Pxn + Pxn+1 + ⋯ + Pxn+k-1 = Pm
- Remarks on some generalization of the notion of microscopic sets
- Disjointness of composition operators on Hv0 spaces
- A common fixed point theorem for non-self mappings in strictly convex menger PM-spaces
- The Poincaré-Cartan forms of one-dimensional variational integrals
- Coarse cohomology with twisted coefficients
- Divisible extension of probability
- Asymptotic behavior of the records of multivariate random sequences in a norm sense
- Strong convergence of the functional nonparametric relative error regression estimator under right censoring
- A new kumaraswamy generalized family of distributions: Properties and applications
- Efficient message transmission via twisted Edwards curves
- Computation of several Hessenberg determinants