Skip to main content

New Public-Key Cryptosystem Using Divisor Class Groups

  • Conference paper
  • First Online:
Book cover Information Security and Privacy (ACISP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2119))

Included in the following conference series:

Abstract

We show how to use ideal arithmetic in the divisor class group of an affine normal subring of K[X, Y] generated by monomials, where K is a field, to design new public-key cryptosystems, whose security is based on the difficulty of the discrete logarithm problem in the divisor class group of that integral domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, W., Loustaunau, P.: An introduction to Gröbner bases, Graduate Studies in Mathematics vol. 3, Amer. Math. Soc., Providence, 1994.

    Google Scholar 

  2. Anderson, D. F.: Subrings of k[X, Y] generated by monomials. Canad. J. Math. 30 (1978) 215–224.

    MATH  MathSciNet  Google Scholar 

  3. Buchmann, J., Düllmann, S.: On the computation of discrete logarithm in class groups, in Advances in Cryptology-CRYPTO’ 90, LNCS 537, Springer-Velag, Berlin, 1991, pp. 134–139.

    Google Scholar 

  4. Buchmann, J., Willams, H. C.: A key-exchange system based on imaginary quadratic fields. J. Cryptology 1 (1988) 107–118.

    Article  MATH  MathSciNet  Google Scholar 

  5. Cox, D., Little, J., O’Shea, D.: Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra, Springer-Velag, New York, 1997.

    Google Scholar 

  6. Denning, D. E.: Cryptography and Data Security, Addison-Wesley, Reading, Massachusetts, 1982.

    MATH  Google Scholar 

  7. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory 22 (1976) 472–492.

    Article  MathSciNet  Google Scholar 

  8. Gilmer, R.: Multiplicative Ideal Theory, Queen’s Papers in Pure and Applied Mathematics, vol 90, Queen’s University, Kingston, Ontario, 1992.

    Google Scholar 

  9. Grayson, D., Stillman, M.: Macaulay 2, 1996. Available via anonymous ftp from http://www.math.uiuc.edu.

  10. Hafner, J. L., McCurley, K. S.: A rigorous subexponential algorithm for computation of class group. J. Amer. Math. Soc. 2 (1989) 837–850.

    Article  MATH  MathSciNet  Google Scholar 

  11. Jacobson Jr., M. J.: Computing discrete logarithms in quadratic orders. J. Cryptology 13 (2000) 473–492.

    Article  MATH  MathSciNet  Google Scholar 

  12. Koblitz, N.: Elliptic curve cryptosystems. Math. Comp. 48 (1987) 203–209.

    Article  MATH  MathSciNet  Google Scholar 

  13. Koblitz, N.: Hyperelliptic cryptosystems. J. Cryptology 1 (1989) 139–150.

    Article  MATH  MathSciNet  Google Scholar 

  14. McCurley, K. S.: Cryptographic key distribution and computation in class groups, in R. A. Mollin, editor, Number Theory and Applications, Kluwer Academic Publishers, 1989, pp. 459–479.

    Google Scholar 

  15. Odlyzko, A. M.: Discrete logarithms in finite fields and their cryptographic significance, Advances in Cryptology-EUROCRYPT’ 84, LNCS 209, Springer-Velag, Berlin, 1985, pp. 224–314.

    Google Scholar 

  16. Paulus, S., Takaki, T.: A new public-key cryptosystem over a quadratic order with quadratic decryption time. J. Cryptology 13 (2000) 263–272.

    Article  MATH  MathSciNet  Google Scholar 

  17. Rivest, R. L., Shamir, A., Adelman, L.: A method for abtaining digital signatures and public key cryptosystems. Communications of the ACM 21 (1978) 120–126.

    Article  MATH  Google Scholar 

  18. Vasconcelos, W. V.: Computational Methods in Commutative Algebra and Algebraic Geometry, Algorithms and Computation in Mathematics, vol. 2, Springer-Velag, Berlin, 1998.

    Google Scholar 

  19. Winkler, F.: On the complexity of the Gröbner-bases algorithm over K[x, y, z]. EUROSAM’ 84, LNCS 174, Springer, Berlin, 1984, pp. 184–194.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, H., Moon, S. (2001). New Public-Key Cryptosystem Using Divisor Class Groups. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_8

Download citation

  • DOI: https://doi.org/10.1007/3-540-47719-5_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42300-3

  • Online ISBN: 978-3-540-47719-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics