Presentation | 1996/7/22 Extension of Rabin Cryptosystem to Eisenstein Field Tsuyoshi TAKAGI, Shozo NAITO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We extend the Rabin cryptosystem to the Eiscnstein held. At First, methods for generating ideals and constructing complete representation class of the field are presented. Based on these bases, we describe the methods of encryption and decryption. It is shown that breaking the proposed cryptosystem is as intractable as factorization. Furthermore, we show that the proposed Rabin cryptosystem is stronger against the Hastad attack than the conventional system. Extension is also done to the Gauss field, which is another quadratic field. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Rabin cryptosystem / quadratic held / Eisenstein field / Gauss field / security / Hastad attack |
Paper # | ISEC96-21 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1996/7/22(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Extension of Rabin Cryptosystem to Eisenstein Field |
Sub Title (in English) | |
Keyword(1) | Rabin cryptosystem |
Keyword(2) | quadratic held |
Keyword(3) | Eisenstein field |
Keyword(4) | Gauss field |
Keyword(5) | security |
Keyword(6) | Hastad attack |
1st Author's Name | Tsuyoshi TAKAGI |
1st Author's Affiliation | NTT Software Laboratories() |
2nd Author's Name | Shozo NAITO |
2nd Author's Affiliation | NTT Software Laboratories |
Date | 1996/7/22 |
Paper # | ISEC96-21 |
Volume (vol) | vol.96 |
Number (no) | 167 |
Page | pp.pp.- |
#Pages | 10 |
Date of Issue |