{"title":"A public key encryption scheme based on compressed sensing","authors":"Liu Zhen","doi":"10.1109/ICAIT.2017.8388821","DOIUrl":null,"url":null,"abstract":"In order to improve the security of Compressed Sensing, this paper put forward a new idea-Compressed Sensing Public Key Encryption (CSPKE), realized a concrete CSPKE algorithm by combing Lattice-based Cryptography with Compressed Sensing, and proved its security of indistinguishability against chosen plaintext attack (IND-CPA) on standard model based on Learning With Error (LWE) assumptions. By using the matrix characteristics of LWE, this algorithm preserved the linear structure of CS. Efficiency analysis shows that it has acceptable increment on cost comparing to CS. It can be used in many fields, such as protecting security of data acquisition process based on CS.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIT.2017.8388821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In order to improve the security of Compressed Sensing, this paper put forward a new idea-Compressed Sensing Public Key Encryption (CSPKE), realized a concrete CSPKE algorithm by combing Lattice-based Cryptography with Compressed Sensing, and proved its security of indistinguishability against chosen plaintext attack (IND-CPA) on standard model based on Learning With Error (LWE) assumptions. By using the matrix characteristics of LWE, this algorithm preserved the linear structure of CS. Efficiency analysis shows that it has acceptable increment on cost comparing to CS. It can be used in many fields, such as protecting security of data acquisition process based on CS.