Home
Search results “Hidden monomial cryptosystems ppt”
Jintai Ding - ZHFE, a New Multivariate Public Key Encryption Scheme
 
22:32
Jintai Ding of the University of Cincinnati and the Chinese Academy of Sciences presented a talk titled: ZHFE, a new multivariate public key encryption scheme at the 2014 PQCrypto conference in October, 2014. Abstract: In this paper we propose a new multivariate public key encryption scheme named ZHFE. The public key is constructed using as core map two high rank HFE polynomials. The inversion of the public key is performed using a low degree polynomial of Hamming weight three. This low degree polynomial is obtained from the two high rank HFE polynomials, by means of a special reduction method that uses HFE polynomials. We show that ZHFE is relatively efficient and the it is secure against the main attacks that have threatened the security of HFE. We also propose parameters for a practical implementation of ZHFE. PQCrypto 2014 Book: http://www.springer.com/computer/security+and+cryptology/book/978-3-319-11658-7 Workshop: https://pqcrypto2014.uwaterloo.ca/ Find out more about IQC! Website - https://uwaterloo.ca/institute-for-qu... Facebook - https://www.facebook.com/QuantumIQC Twitter - https://twitter.com/QuantumIQC
A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-composite
 
09:02
A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-composite To get this project in Online or through training sessions Contact: Chennai Office: JP INFOTECH, Old No.31, New No.86, 1st Floor, 1st Avenue, Ashok Pillar, Chennai – 83. Landmark: Next to Kotak Mahendra Bank / Bharath Scans. Landline: (044) - 43012642 / Mobile: (0)9952649690 Pondicherry Office: JP INFOTECH, #37, Kamaraj Salai, Thattanchavady, Puducherry – 9. Landline: (0413) - 4204066 / (0)9952649690 Email: [email protected], Mobile: (0)9952649690, Website: http://www.jpinfotech.org The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the establishment of symmetric keys. A promising key distribution technique is the random predistribution of secret keys. Despite its effectiveness, this approach presents considerable memory overheads, in contrast with the limited resources of wireless sensor networks. In this paper, an in-depth analytical study is conducted on the state-of-the-art key distribution schemes based on random predistribution. A new protocol, called q-s-composite, is proposed in order to exploit the best features of random predistribution and to improve it with lower requirements. The main novelties of q-s-composite are represented by the organization of the secret material that allows a storing reduction, by the proposed technique for pairwise key generation, and by the limited number of predistributed keys used in the generation of a pairwise key. A comparative analysis demonstrates that the proposed approach provides a higher level of security than the state-of-the-art schemes.
Views: 94 jpinfotechprojects