Abstract
This paper proposes a new public key encryption scheme. It is based on the difficulty of deducing x and y from A and B = x·A ·y in a specific monoid (m,·) which is noncommutative. So we select and do research work on the certain monoid which is formed by all the n×n matrices over finite field F 2 under multiplication. By the cryptographic properties of an “ergodic matrix”, we propose a hard problem based on the ergodic matrices over F 2, and use it construct a public key encryption scheme.
This work supported by the National Research Foundation for the Doctoral Program of Higher Education of China under Grant No. 20050183032, and the Jilin Province Education Office Science Foundation Project of China under Grant No.2004150 and No. 2005180.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, New York (1997)
Schneier, B.: Applied Cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, Chichester (1996)
Gantmacher, F.R.: The Theory of Matrices, vol. 2. Chelsea, New York (1974)
Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge Univ. Press, Cambridge (1994)
Zhao, Y., Wang, L., Zhang, L.W.: Information-Exchange Using the Ergodic Matrices in GF(2). In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 388–397. Springer, Heidelberg (2004)
Zhao, Y., Huang, S., Jiang, Z.: Ergodic matrices over GF(2k) and their properties. Mini-Micro Systems 26(12), 35–39 (2005)
Sun, Y., et al.: Scheme to construct one-way(trapdoor)functions based on ergodic matrice. Journal of Jilin University 24(5), 554–560 (2006)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31(4), 469–472 (1985)
Gerard, M., Chris, M., Joachim, R.: A public key cryptosystem based on actions by semigroups. In: IEEE International Symposium on Information Theory-Proceedings, pp. 266–289 (2002)
Arash, R., Anwar, H.: A new construction of Massey-Omura parallel multiplier over GF(2m). IEEE Transactions on Computers 51(5), 511–520 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shi-Hui, P., Yong-Zhe, Z., Hong-Wei, Z. (2007). Construct Public Key Encryption Scheme Using Ergodic Matrices over GF(2). In: Cai, JY., Cooper, S.B., Zhu, H. (eds) Theory and Applications of Models of Computation. TAMC 2007. Lecture Notes in Computer Science, vol 4484. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72504-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-72504-6_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72503-9
Online ISBN: 978-3-540-72504-6
eBook Packages: Computer ScienceComputer Science (R0)