{"title":"Secure obfuscation of EIGamal cryption system based on polynomials over finite fields","authors":"Yaohong D. Jiang, G. Gong","doi":"10.1109/ICIST.2013.6747574","DOIUrl":null,"url":null,"abstract":"As the traditional EIGamal encryption system can only encrypt a plaintext every time, while present secure obfuscation of EIGamal encryption system based on polynomials over finite fields can encrypt more than one plaintext at the same time. This encryption system not only retains the EIGamal public key system functions, but also has the advantages of indistinguishability obfuscation (i.e. difficult identification). The security of this scheme mainly depends on the characteristics of the hash function and the intractability of discrete logarithm problem.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIST.2013.6747574","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As the traditional EIGamal encryption system can only encrypt a plaintext every time, while present secure obfuscation of EIGamal encryption system based on polynomials over finite fields can encrypt more than one plaintext at the same time. This encryption system not only retains the EIGamal public key system functions, but also has the advantages of indistinguishability obfuscation (i.e. difficult identification). The security of this scheme mainly depends on the characteristics of the hash function and the intractability of discrete logarithm problem.