Skip to main content
Log in

A CCA secure public key encryption scheme based on finite groups of Lie type

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. Gilmore R. Lie groups, Lie algebras, and Some of Their Applications. Massachusetts: Courier Corporation, 2012

    MATH  Google Scholar 

  2. Hall B. Lie Groups, Lie Algebras, and Representations: an Elementary Introduction. Berlin: Springer, 2015

    Book  MATH  Google Scholar 

  3. Courtois N, Klimov A, Patarin J, et al. Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Proceeding of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2000. 392–407

    MATH  Google Scholar 

  4. Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Proceeding of Annual International Cryptology Conference. Berlin: Springer, 2001. 213–229

    Google Scholar 

  5. Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In: Proceeding of Annual International Cryptology Conference. Berlin: Springer, 1999. 537–554

    MATH  Google Scholar 

  6. Menezes A J, Wu Y H. The discrete logarithm problem in GL(n, q). Ars Combinatoria, 1997, 47: 23–32

    MathSciNet  MATH  Google Scholar 

  7. Joux A. Algorithmic Cryptanalysis. Boca Raton: Chapman and Hall/CRC, 2009

    Book  MATH  Google Scholar 

  8. Joux A, Odlyzko A, Pierrot C. The past, evolving present, and future of the discrete logarithm. In: Open Problems in Mathematics and Computational Science. Berlin: Springer, 2014. 5–36

    Chapter  MATH  Google Scholar 

Download references

Acknowledgements

This work was partially supported by the National Natural Science Foundation of China (NSFC) (Grant Nos. 61602408, 61972050, 61972352, U1709217), Zhejiang Provincial Natural Science Foundation (Grant Nos. LY19F020005, LY18F020009, LZ18F020003), and Key Research and Development Program of Hangzhou (Grant No. 20182011A46).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haibo Hong.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hong, H., Shao, J., Wang, L. et al. A CCA secure public key encryption scheme based on finite groups of Lie type. Sci. China Inf. Sci. 65, 119102 (2022). https://doi.org/10.1007/s11432-019-2704-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2704-7

Navigation