• Tidak ada hasil yang ditemukan

An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme - UMS INSTITUTIONAL REPOSITORY

N/A
N/A
Protected

Academic year: 2024

Membagikan "An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme - UMS INSTITUTIONAL REPOSITORY"

Copied!
1
0
0

Teks penuh

(1)

An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme

\ABSTRACT

This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich-Goldwasser-Halevi lattice-based encryption scheme, referred to as the GGH-MKA cryptosystem. The keys for this cryptosystem consisting of lattice bases where the private key is required to be a ‘good’ basis while the public key is required to be a ‘bad’ basis to ensure the cryptosystem works effectively. In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value.

If the value is ‘close to 1’, the basis is considered as a good basis. On the contrary, the basis is considered as a bad basis if its orthogonality-defect value is ‘far from 1’. Clearly, the consideration on various subjective terms could potentially trigger technical error during the key generation processes. In this paper, we proposed new conditions on the private and public bases of the GGH- MKA cryptosystem. Instead of depending solely on the orthogonality-defect values, the proposed conditions could make the measurement of good and bad bases in the key generation algorithm of the GGH-MKA cryptosystem becomes clearer and deterministic.

Referensi

Dokumen terkait

This study suggests the optimized dispatching of the micro-power grid based on the improved particle swarm optimization algorithm IPSO for full playing to the power generation advantage

We also provided the counter- measures to avoid ID-S in symmetric-key-based authentication schemes and based on the countermeasures we proposed an improved authentication scheme using

To achieve this end, four steps were taken: first, an investigation of the status of vocational training programs in delivering key skills and a survey of the market demand for the

Key skills for the 21st century: An evidence-based review Quentin Maire Victoria University Quentin Maire is a Research Fellow at the Centre for International Research on Education

Below is a symmetric encryption algorithm [4] created based on the complexity of the solution of the problem of parameter multiplication of matrices and discrete logarithmization in a

Evaluation of the Effect of Ideological and Political Education on Psychological Crisis Intervention for University Students Based on Data Mining Algorithm ABSTRACT The mental

Based on a known k-shortest paths algorithm and a de- composition of the surrounding region Π, this article presents an approximate algorithm for computing a general Euclidean shortest

This study was carried out to evaluate the consistency of the calibration algorithm for AOD mea- surement using the Perez sky clearness index.. Sky classification using the Perez model