Skip to main navigation Skip to search Skip to main content

New constructions of public-key encryption schemes from conjugacy search problems

  • Lihua Wang*
  • , Licheng Wang*
  • , Zhenfu Cao
  • , Eiji Okamoto
  • , Jun Shao
  • *Corresponding author for this work
  • Japan National Institute of Information and Communications Technology
  • Beijing University of Posts and Telecommunications
  • Shanghai Jiao Tong University
  • University of Tsukuba
  • Zhejiang Gongshang University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We propose new public-key encryption schemes based on the conjugacy search problems (CSP) over noncommutative monoids. Under the newly developed cryptographic assumptions, our basic construction is proven IND-CPA secure in the standard model. Then, we describe two extensions: The first is proven IND-CCA secure in the random oracle model, while the second achieves the IND-CCA security in the standard model. Finally, our proposal is instantiated by using the monoid of matrices over truncated multivariable polynomials over rings. Meanwhile, we also give a discussion on the possibility to instantiate our schemes with braid groups.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - 6th International Conference, Inscrypt 2010, Revised Selected Papers
Pages1-17
Number of pages17
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event6th China International Conference on Information Security and Cryptology, Inscrypt 2010 - Shanghai, China
Duration: 20 Oct 201024 Oct 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6584 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th China International Conference on Information Security and Cryptology, Inscrypt 2010
Country/TerritoryChina
CityShanghai
Period20/10/1024/10/10

Keywords

  • braid groups
  • conjugacy search problems
  • public-key encryption
  • truncated multivariable polynomials over rings

Fingerprint

Dive into the research topics of 'New constructions of public-key encryption schemes from conjugacy search problems'. Together they form a unique fingerprint.

Cite this