Exploring Naccache-Stern Knapsack Encryption
The Naccache-Stern public-key cryptosystem (NS) relies on the conjectured hardness of the modular multiplicative knapsack problem: Given $$p,\{v_i\},\prod v_i^{m_i} \bmod p$$ , find the $$\{m_i\}$$ . Given this scheme’s algebraic structure it is interesting to systematically explore its variants and...
Saved in:
| Published in | Innovative Security Solutions for Information Technology and Communications Vol. 10543; pp. 67 - 82 |
|---|---|
| Main Authors | , , |
| Format | Book Chapter |
| Language | English |
| Published |
Switzerland
Springer International Publishing AG
2017
Springer International Publishing |
| Series | Lecture Notes in Computer Science |
| Online Access | Get full text |
| ISBN | 3319692836 9783319692838 |
| ISSN | 0302-9743 1611-3349 |
| DOI | 10.1007/978-3-319-69284-5_6 |
Cover
| Abstract | The Naccache-Stern public-key cryptosystem (NS) relies on the conjectured hardness of the modular multiplicative knapsack problem: Given $$p,\{v_i\},\prod v_i^{m_i} \bmod p$$ , find the $$\{m_i\}$$ .
Given this scheme’s algebraic structure it is interesting to systematically explore its variants and generalizations. In particular it might be useful to enhance NS with features such as semantic security, re-randomizability or an extension to higher-residues.
This paper addresses these questions and proposes several such variants. |
|---|---|
| AbstractList | The Naccache-Stern public-key cryptosystem (NS) relies on the conjectured hardness of the modular multiplicative knapsack problem: Given $$p,\{v_i\},\prod v_i^{m_i} \bmod p$$ , find the $$\{m_i\}$$ .
Given this scheme’s algebraic structure it is interesting to systematically explore its variants and generalizations. In particular it might be useful to enhance NS with features such as semantic security, re-randomizability or an extension to higher-residues.
This paper addresses these questions and proposes several such variants. |
| Author | Géraud, Rémi Brier, Éric Naccache, David |
| Author_xml | – sequence: 1 givenname: Éric surname: Brier fullname: Brier, Éric email: eric.brier@ingenico.com organization: Ingenico Terminals, Alixan, France – sequence: 2 givenname: Rémi surname: Géraud fullname: Géraud, Rémi email: remi.geraud@ens.fr organization: École Normale Supérieure, Paris Cedex 05, France – sequence: 3 givenname: David surname: Naccache fullname: Naccache, David email: david.naccache@ens.fr organization: École Normale Supérieure, Paris Cedex 05, France |
| BookMark | eNqNkMtOAzEMRQMURFv6BWz6AQSS2JPHElXlISpYAOsok0lpaZUZJoNU_p70IbFlZdnWufa9A9KLdQyEXHJ2zRlTN0ZpChS4odIIjbSw8ogMIA92PR6TPpecUwA0J38LkD3SZ8AENQrhjAyymGEoEPg5GaX0yRjjBhgvsE-upptmXbfL-DF-dt47vwj0tQttHD9F1yTnV-Np9O1P0y3reEFO526dwuhQh-T9bvo2eaCzl_vHye2MNvl6R6tgtAMlSgdYlEGg8t4ILw0LoSrnCisNzJQOtUYdODgsnHFlVTqBKAPCkPC9bmq2n4XWlnW9SpYzuw3G5mAs2GzX7oKwOZjMiD3TtPXXd0idDVvIh9i1bu0XrsmukpVCc8kKq6RV-r9QURjBuThAv94GdB4 |
| ContentType | Book Chapter |
| Copyright | Springer International Publishing AG 2017 |
| Copyright_xml | – notice: Springer International Publishing AG 2017 |
| DBID | FFUUA |
| DOI | 10.1007/978-3-319-69284-5_6 |
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 3319692844 9783319692845 |
| EISSN | 1611-3349 |
| Editor | Simion, Emil Farshim, Pooya |
| Editor_xml | – sequence: 1 fullname: Simion, Emil – sequence: 2 fullname: Farshim, Pooya |
| EndPage | 82 |
| ExternalDocumentID | EBC6281605_76_78 EBC5592112_76_78 |
| GroupedDBID | 0D6 0DA 38. AABBV AALVI ABBVZ ABHTH ABQUB ACDJR ADCXD AEDXK AEJLV AEKFX AEZAY AGIGN AGYGE AIODD ALBAV ALMA_UNASSIGNED_HOLDINGS AZZ BATQV BBABE CVWCR CZZ FFUUA I4C IEZ SBO SWYDZ TPJZQ TSXQS Z7R Z7S Z7U Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z88 -DT -~X 29L 2HA 2HV ACGFS EJD F5P LAS LDH P2P RSU ~02 |
| ID | FETCH-LOGICAL-p283t-de98a372ba345be247cc92c690eedbf74d8309ba48848e13a45a9abdba2446e43 |
| ISBN | 3319692836 9783319692838 |
| ISSN | 0302-9743 |
| IngestDate | Tue Jul 29 19:45:38 EDT 2025 Thu May 29 01:53:45 EDT 2025 Thu May 29 00:51:40 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| LCCallNum | QA76.9.A25QA76.9.D35 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-p283t-de98a372ba345be247cc92c690eedbf74d8309ba48848e13a45a9abdba2446e43 |
| Notes | Original Abstract: The Naccache-Stern public-key cryptosystem (NS) relies on the conjectured hardness of the modular multiplicative knapsack problem: Given \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$p,\{v_i\},\prod v_i^{m_i} \bmod p$$\end{document}, find the \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\{m_i\}$$\end{document}. Given this scheme’s algebraic structure it is interesting to systematically explore its variants and generalizations. In particular it might be useful to enhance NS with features such as semantic security, re-randomizability or an extension to higher-residues. This paper addresses these questions and proposes several such variants. |
| OCLC | 1009042431 |
| PQID | EBC5592112_76_78 |
| PageCount | 16 |
| ParticipantIDs | springer_books_10_1007_978_3_319_69284_5_6 proquest_ebookcentralchapters_6281605_76_78 proquest_ebookcentralchapters_5592112_76_78 |
| PublicationCentury | 2000 |
| PublicationDate | 2017 20171029 |
| PublicationDateYYYYMMDD | 2017-01-01 2017-10-29 |
| PublicationDate_xml | – year: 2017 text: 2017 |
| PublicationDecade | 2010 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Cham |
| PublicationSeriesSubtitle | Security and Cryptology |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSeriesTitleAlternate | Lect.Notes Computer |
| PublicationSubtitle | 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers |
| PublicationTitle | Innovative Security Solutions for Information Technology and Communications |
| PublicationYear | 2017 |
| Publisher | Springer International Publishing AG Springer International Publishing |
| Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, United Kingdom – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, United Kingdom – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: CNB H 104.2, ETH Zurich, Zürich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Madras, Indian Institute of Technology, Chennai, India – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: Fakultät Informatik, TU Dortmund, Dortmund, Germany – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max Planck Institute for Informatics, Saarbrücken, Germany |
| SSID | ssj0001930154 ssj0002792 |
| Score | 1.8602798 |
| Snippet | The Naccache-Stern public-key cryptosystem (NS) relies on the conjectured hardness of the modular multiplicative knapsack problem: Given $$p,\{v_i\},\prod... |
| SourceID | springer proquest |
| SourceType | Publisher |
| StartPage | 67 |
| Title | Exploring Naccache-Stern Knapsack Encryption |
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5592112&ppg=78 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6281605&ppg=78 http://link.springer.com/10.1007/978-3-319-69284-5_6 |
| Volume | 10543 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwELVguaAeoJSq0A_lwKmLq13bcZIjoG0RUC4FxM2yY-dSKSzsUqn99X1OnGQTrVTRSxRZTmTnOaM3z54ZQo6KGGYPNJj6ZGVUWO2oFnFG0cRkId3ESB-N_P1ant-Ki_v4viuCWEWXLM2X_M_auJL_QRVtwNVHyb4A2falaMA98MUVCOM6IL99mTUcF6zrmf5yQTQHnW5Frur0YAg1qhDuJPRqu6AXF7JYXTfdobxrje8OTOkPLxqOL0s9X-j853hW5k-_5y2gQTKYJgPJoJEMB6Ljiu518q3nZnL_n2YgImnPboLt8bVWePXghQ-S8s8KGqs1Oa_r-j2DlNez0zPJ0ik8LZVIhS7zR-rrhPn99FA0ZZNsYlwjsnUyu7i661S1jHtS6IN4mjHLOs1SN4c291SdXngwxJ6nMdgcrzjHzS555eNQIh8gglG_Jhuu3CM7TRWOKBjlN-S4RSzqIxY1iEUdYvvk9uvs5uychhoYdI6xLql1Wap5wozmIjaOiSTPM5bLbAJyY4pE2JRPMqNhh0Xqphw_ms60sUaDt0kn-FsyKh9K945EkjHwP2fhETsh4GYmsRXGWm0LJnQhD8i4mbmqdurD8eC8nudCwflkoOc1Jv_s3UPwgHxuPqXynReqSZcNCBRXgEBVEChAcPiiV78n290a_0BGy6dn9xFEcWk-hdXxFzJdaHc |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Innovative+Security+Solutions+for+Information+Technology+and+Communications&rft.atitle=Exploring+Naccache-Stern+Knapsack+Encryption&rft.date=2017-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319692838&rft.volume=10543&rft_id=info:doi/10.1007%2F978-3-319-69284-5_6&rft.externalDBID=78&rft.externalDocID=EBC6281605_76_78 |
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5592112-l.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6281605-l.jpg |