Skip to main content

A generalized encryption scheme based on random graphs

  • Conference paper
  • First Online:
Graph-Theoretic Concepts in Computer Science (WG 1991)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 570))

Included in the following conference series:

Abstract

A probabilistic encryption scheme is generalized in such a way that an encryption is sometimes ambiguous (the same object might be an encryption of both 0 and 1), but a probability of this event is very low. Such a generalization is sufficient for a large number of applications.

An implementation of the scheme presented in the paper is based on random graphs. From the point of view of the worst-case complexity, the problem of decrypting is provable NP-complete, while classical encryption schemes use always problems from NPPcoNPP (and most graph problems of this class are either easily solvable or related to linear programming, which makes it possible to use the ellipsoidal method to break such a scheme). However, it is not known whether there are polynomial time deterministic or probabilistic decoding algorithms with probability of success bounded away form 1/2. It is shown that some obvious polynomial time attacks are too weak to break the scheme with sufficiently large probability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Babai,L.,Kučera,L.,Canonical labelling of graphs in linear average time, 20th Annual Symposium on Foundations of Computer Science, Puerto Rico 1979, 39–46

    Google Scholar 

  2. Bollobás B., Random Graphs, Academic Press, London 1985.

    Google Scholar 

  3. Even, S. and Yakobi, Y., Cryptocomplexity and N P-completeness, In Proc. 8th Colloq. on Automata, Languages, and Programming, Lecture Notes in Computer Science, 195–207, Springer Verlag, Berlin, 1980.

    Google Scholar 

  4. Goldwasser,S., Micali,S., Rackoff,C., The knowledge complexity of interactive proofs, 17th Annual Symposium on Foundations of Computer Science, Providence, RI, 1985,291–305.

    Google Scholar 

  5. Levin, L., Average case complete problems, SIAM J. Computing, 15 (1986), 285–286.

    Google Scholar 

  6. Levin,L., personal communication.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gunther Schmidt Rudolf Berghammer

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kučera, L. (1992). A generalized encryption scheme based on random graphs. In: Schmidt, G., Berghammer, R. (eds) Graph-Theoretic Concepts in Computer Science. WG 1991. Lecture Notes in Computer Science, vol 570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-55121-2_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-55121-2_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-55121-8

  • Online ISBN: 978-3-540-46735-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics