×

On the security of the Lucas function. (English) Zbl 0875.94113

Summary: Recently, Smith and Lennon proposed a new public key system whose trapdoor is based on the defined Lucas function instead of exponentiation. It is believed that the security of the Lucas function is cryptographically stronger than or at least as strong as the security of exponentiation function, i.e., the discrete logarithm problems. However, it is not really known that the security relationship between the Lucas function and the discrete logarithm problems. We are concerned on the security of the Lucas function and will show that the security of Lucas function is polynomial-time equivalent to the generalized discrete logarithm problems.

MSC:

94A60 Cryptography
Full Text: DOI

References:

[1] Diffie, W.; Hellman, M. E., New directions in cryptography, IEEE Trans. Inform. Theory, 22, 644-654 (1976) · Zbl 0435.94018
[2] Rivest, R. L.; Shamir, A.; Adleman, L., A method for obtaining digital signature and public-key cryptosystems, Comm. ACM, 21, 120-126 (1978) · Zbl 0368.94005
[3] ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, 31, 469-472 (1985) · Zbl 0571.94014
[4] P.J. Smith and M.J.J. Lennon, LUC: A new public key system, IFIP SEC’93; P.J. Smith and M.J.J. Lennon, LUC: A new public key system, IFIP SEC’93
[5] McCurley, K. S., The Discrete Logarithm Problem, (Lecture Notes of the American Mathematical Society, 36 (1989), American Mathematical Society: American Mathematical Society Providence, RI), (4) · Zbl 0734.11073
[6] McEliece, R. J., Finite Fields for Scientists and Computer Engineers (1987), Kluwer Academic Publishers: Kluwer Academic Publishers Dordrecht · Zbl 0662.94014
[7] ElGamal, T., A subexponential-time algorithm for computing discrete logarithm over \(GF (p^2)\), IEEE Trans. Inform. Theory, 31, 473-481 (1985) · Zbl 0573.12006
[8] Laih, C. S.; Tu, F. K.; Tai, W. C., Remarks on the LUC public key system, Electronics Lett., 30, 123-124 (1994)
[9] Müller, W. B.; Nöbauer, W., Some remarks on public-key cryptosystems, Studia Sci. Math. Hungar., 16, 71-76 (1981) · Zbl 0476.94016
[10] Müller, W. B.; Nöbauer, W., cryptanalysis of the Dickson-scheme, (Advances in Cryptology: Proceedings of Eurocrypt’85. Advances in Cryptology: Proceedings of Eurocrypt’85, Lecture Notes in Computer Science, 219 (1986), Springer: Springer Berlin), 50-61 · Zbl 0591.94018
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.