CPC-H2: Convolution Power-based Cryptosystem and Digital Signature

Hamid Hajaje, Zine El Abidine Guennoun, Mounib Khanafer, Youssef Gahi, Junaid Israr, Mouhcine Guennoun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

ElGamal system was introduced by Taher ElGamal in his landmark paper in 1985 [1]. ElGamal is an important asymmetric cryptosystem that is based on the discrete logarithm problem. In brief, this cryptosystem relies on the difficulty of computing discrete logarithms over finite fields [1]. Towards solving discrete logarithms, Shor demonstrated the existence of a polynomial algorithm that can solve these logarithms on quantum machines [2]. In this paper we propose the Convolution Power Cryptosystem (CPC-H2); an extension to the ElGamal cryptosystem that is based on a novel hard problem. CPC-H2 is designed to defend against a Chosen Ciphertext Attack. We show that CPC-H2 is less complicated and has a higher security level than the Number Theory Research Unit (NTRU).

Original languageEnglish
Title of host publication2021 IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665448642
DOIs
StatePublished - 12 Sep 2021
Event2021 IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2021 - Virtual, Online, Canada
Duration: 12 Sep 202117 Sep 2021

Publication series

NameCanadian Conference on Electrical and Computer Engineering
Volume2021-September
ISSN (Print)0840-7789

Conference

Conference2021 IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2021
Country/TerritoryCanada
CityVirtual, Online
Period12/09/2117/09/21

Keywords

  • Asymmetric Cryptosystem
  • Convolution Power
  • Matrix Power
  • NTRU
  • Pseudo generator

Fingerprint

Dive into the research topics of 'CPC-H2: Convolution Power-based Cryptosystem and Digital Signature'. Together they form a unique fingerprint.

Cite this