• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Su, Shenghui (Su, Shenghui.) | Lu, Shuwang (Lu, Shuwang.) | Fan, Xiubin (Fan, Xiubin.)

收录:

EI Scopus SCIE

摘要:

It is well known that the inverse function of y = x with the derivative y' = 1 is x = y, the inverse function of y = c with the derivative y' = 0 is nonexistent, and so on. Hence, on the assumption that the noninvertibility of the univariate increasing function y = (x) with x > 0 is in direct proportion to the growth rate reflected by its derivative, the authors put forward a method of comparing difficulties in inverting two functions on a continuous or discrete interval called asymptotic granularity reduction (AGR) which integrates asymptotic analysis with logarithmic granularities, and is an extension and a complement to polynomial time (Turing) reduction (PTR). Prove by AGR that inverting y equivalent to x(x) (mod p) is computationally harder than inverting y equivalent to g(x) (mod p), and inverting y equivalent to g(xn) (mod p) is computationally equivalent to inverting y equivalent to g(x) (mod p), which are compatible with the results from PTR. Besides, apply AGR to the comparison of inverting y equivalent to x(n) (mod p) with y equivalent to g(x) (mod p), y equivalent to g(g1x) (mod p) with y equivalent to g(x) (mod p), and y equivalent to x(n) + x + 1 (mod p) with y equivalent to x(n) (mod p) in difficulty, and observe that the results are consistent with existing facts, which further illustrates that AGR is suitable for comparison of inversion problems in difficulty. Last, prove by AGR that inverting y equivalent to x(n)g(x) (mod p) is computationally equivalent to inverting y equivalent to g(x) (mod p) when PTR cannot be utilized expediently. AGR with the assumption partitions the complexities of problems more detailedly, and finds out some new evidence for the security of cryptosystems. (C) 2011 Elsevier B.V. All rights reserved.

关键词:

Asymptotic granularity reduction Polynomial time reduction Provable security Public key cryptosystem Transcendental logarithm problem

作者机构:

  • [ 1 ] [Su, Shenghui]Beijing Univ Technol, Coll Comp, Beijing 100124, Peoples R China
  • [ 2 ] [Lu, Shuwang]Chinese Acad Sci, Grad Sch, Beijing 100039, Peoples R China
  • [ 3 ] [Fan, Xiubin]Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China

通讯作者信息:

  • [Su, Shenghui]Beijing Univ Technol, Coll Comp, Beijing 100124, Peoples R China

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

THEORETICAL COMPUTER SCIENCE

ISSN: 0304-3975

年份: 2011

期: 39

卷: 412

页码: 5374-5386

1 . 1 0 0

JCR@2022

ESI学科: COMPUTER SCIENCE;

ESI高被引阀值:156

JCR分区:3

中科院分区:4

被引次数:

WoS核心集被引频次: 8

SCOPUS被引频次: 11

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

在线人数/总访问数:1409/2912075
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司