کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
6422707 1341217 2014 23 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
An overview of trace based public key cryptography over finite fields
ترجمه فارسی عنوان
یک مرور کلی از رمزنگاری کلید عمومی مبتنی بر ردیابی بر زمینه های محدود
موضوعات مرتبط
مهندسی و علوم پایه ریاضیات ریاضیات کاربردی
چکیده انگلیسی
The Discrete Log Problem (DLP), that is computing x, given y=αx and 〈α〉=G⊂Fq∗, based Public Key Cryptosystem (PKC) have been studied since the late 1970's. Such development of PKC was possible because of the trapdoor function f:Zℓ→G=〈α〉⊂Fq∗, f(m)=αm is a group homomorphism. Due to this fact we have; Diffie Hellman (DH) type key exchange, ElGamal type message encryption, and Nyberg-Rueppel type digital signature protocols. The cryptosystems based on the trapdoor f(m)=αm are well understood and complete. However, there is another trapdoor function f:Zℓ→G, f(m)→Tr(αm), where G=〈α〉⊂Fqk∗,k≥2, which needs more attention from researchers from a cryptographic protocols point of view. In the above mentioned case, although f is computable, it is not clear how to produce protocols such as Diffie Hellman type key exchange, ElGamal type message encryption, and Nyberg-Rueppel type digital signature algorithm, in general. It would be better, of course if we can find a more efficient algorithm than repeated squaring and trace to compute f(m)=Tr(αm) together with these protocols. In the literature we see some works for a more efficient algorithm to compute f(m)=Tr(αm) and not wondering about the protocols. We also see some works dealing with an efficient algorithm to compute Tr(αm) as well as discussing the cryptographic protocols. In this review paper, we are going to discuss the state of art on the subject.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Computational and Applied Mathematics - Volume 259, Part B, 15 March 2014, Pages 599-621
نویسندگان
, ,