• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Zhiping, Ye Dingfeng, and Ma Weiju. Perturbed Variant of TTM Cryptosystem[J]. Journal of Computer Research and Development, 2006, 43(12): 2082-2087.
Citation: Wu Zhiping, Ye Dingfeng, and Ma Weiju. Perturbed Variant of TTM Cryptosystem[J]. Journal of Computer Research and Development, 2006, 43(12): 2082-2087.

Perturbed Variant of TTM Cryptosystem

More Information
  • Published Date: December 14, 2006
  • Internal perturbation is added to the TTM cryptosystem, and its new variant is constructed. Using small instances of the variant, the security of the new variant is investigated against minrank attack and linearization equation attack. The necessary condition is given, under which there do not exist linear equations in the variant of the TTM cryptosystem. Computer experiments indicate that there almost do not exist linear equations in the new variant. A specific instance is proposed for practical implementation, and its performance and security are estimated.
  • Related Articles

    [1]Jiao Pengfei, Chen Shuxin, Guo Xuan, He Dongxiao, Liu Dong. Survey on Graph Neural Ordinary Differential Equations[J]. Journal of Computer Research and Development, 2024, 61(8): 2045-2066. DOI: 10.7544/issn1000-1239.202440192
    [2]Han Songshen, Guo Songhui, Xu Kaiyong, Yang Bo, Yu Miao. Perturbation Analysis of the Vital Region in Speech Adversarial Example Based on Frame Structure[J]. Journal of Computer Research and Development, 2024, 61(3): 685-700. DOI: 10.7544/issn1000-1239.202221034
    [3]Shen Yijie, Li Liangcheng, Liu Ziwei, Liu Tiantian, Luo Hao, Shen Ting, Lin Feng, Ren Kui. Stealthy Attack Towards Speaker Recognition Based on One-“Audio Pixel” Perturbation[J]. Journal of Computer Research and Development, 2021, 58(11): 2350-2363. DOI: 10.7544/issn1000-1239.2021.20210632
    [4]Meng Yinfeng, Liang Jiye. Linear Regularized Functional Logistic Model[J]. Journal of Computer Research and Development, 2020, 57(8): 1617-1626. DOI: 10.7544/issn1000-1239.2020.20200496
    [5]Feng Da, Zhou Fucai, Wang Qiang, Wu Qiyu. Efficient Verifiable Outsourcing of Solving Large-Scale Linear Equations with Low Storage Overhead[J]. Journal of Computer Research and Development, 2019, 56(5): 1123-1131. DOI: 10.7544/issn1000-1239.2019.20180191
    [6]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [7]Cui Zhen, Shan Shiguang, Chen Xilin. Structured Sparse Linear Discriminant Analysis[J]. Journal of Computer Research and Development, 2014, 51(10): 2295-2301. DOI: 10.7544/issn1000-1239.2014.20130188
    [8]Feng Lin, Liu Shenglan, Zhang Jing, and Wang Huibing. Robust Activation Function of Extreme Learning Machine and Linear Dimensionality Reduction in High-Dimensional Data[J]. Journal of Computer Research and Development, 2014, 51(6): 1331-1340.
    [9]Li Shengmei, Cheng Buqi, Gao Xingyu, Qiao Lin, Tang Zhizhong. A Method on Analyzing Performance Sensitivity of Applications Based on Partial Derivatives of Non-linear Regression Equation[J]. Journal of Computer Research and Development, 2010, 47(9): 1654-1662.
    [10]Wu Jiying and Ruan Qiuqi. A Curvature-Driven Image Inpainting Model Based on Helmholtz Vorticity Equation[J]. Journal of Computer Research and Development, 2007, 44(5): 860-866.

Catalog

    Article views (624) PDF downloads (669) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return