scholarly journals Secure Integration of Asymmetric and Symmetric Encryption Schemes

Author(s):  
Eiichiro Fujisaki ◽  
Tatsuaki Okamoto
2015 ◽  
Vol 52 (2) ◽  
pp. 257-264 ◽  
Author(s):  
Péter Kasza ◽  
Péter Ligeti ◽  
Ádám Nagy

In this paper we propose a decentralized privacy-preserving system which is able to share sensible data in a way, that only predefined subsets of authorized entities can recover the data after getting an additional alarm message. The protocol uses two main communication channels: a P2P network where the encrypted information is stored, and a smaller private P2P network, which consists of the authorized parties called friend-to-friend network. We describe the communication protocol fulfilling the desired security requirements. The proposed protocol achieves unconditional security. The main cryptographic building blocks of the protocol are symmetric encryption schemes and secret sharing schemes.


2011 ◽  
Vol 26 (1) ◽  
pp. 80-101 ◽  
Author(s):  
Eiichiro Fujisaki ◽  
Tatsuaki Okamoto

Author(s):  
Alexandra Matiyko

Due to the need of creation a symmetric encryption scheme for practical usage, the security of which (similarly to asymmetric cryptosystems) is based on the difficulty of solving only one computational problem, in 2017 the NTRUCipher encryption scheme was proposed. Preliminary researches of this encryption scheme have been conducted, but the question of NTRUCipher’s security to certain specific attacks is open. This article provides estimates of the complexity of chosen-plaintext attack on the NTRUCipher encryption scheme and even on its natural improvement NTRUCipher+. The given analytical estimates allow to compare the security of these encryption schemes and to make a conclusion about inexpediency of usage the NTRUCipher+ encryption scheme for its increase.


2009 ◽  
Vol 52 (9) ◽  
pp. 1617-1631 ◽  
Author(s):  
ZhenYu Hu ◽  
FuChun Sun ◽  
JianChun Jiang

Sign in / Sign up

Export Citation Format

Share Document