EUROCRYPT 1987: Advances in Cryptology — EUROCRYPT’ 87 pp 143-147 | Cite as
A Public Key Analog Gyptosystem
Conference paper
First Online:
Abstract
In this paper we present a public key cryptosystem based on error correcting codes [1], [7], [15]. The new public key system is obtained by extending the public key cryptosystem of McEliece [6], [12].
Keywords
Orthonormal System Complete Orthonormal System Correct Message True Noise Independent Normal Random Variable
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download
to read the full conference paper text
References
- [1]Berlekamp, E., Algebraic Coding Theory, McGraw Hill, New York (1968).MATHGoogle Scholar
- [2]Blum, J., Susarla, V., and Walter, G., “Estimation of the Prior Distribution Using-Differential Operators,” Colloquia Mathematica Societatis, (1980).Google Scholar
- [3]Coddington, E.A. and Levinson, N., Theory of Ordinary Differential Equations, McGraw Hill, New Yak (1955).MATHGoogle Scholar
- [4]Davida, G., Gilbertson, C., and Walter, G., “Analog Cryptosystems,” Eurocrypt85, (1985).Google Scholar
- [5]Davida, G. and Walter, G., “A Class of Analog Cryptosystems,” SECURICOM 87, (1987).Google Scholar
- [6]Denning, D., Cryptography and Computer Security, Addison Wesley, Reading, MA (1982).Google Scholar
- [7]Diffie, W. and Hellman, M., “New Directions in Cryptography,” IEEE Transactions on Information Theory IT-22(6)(1976).Google Scholar
- [8]E., Hellman, M.E., “An Extension of the Shannon Theory Approach to Cryptography,” IEEE Trans. on Info. Theory IT-23 pp. 289–294 (May 1977).CrossRefMathSciNetGoogle Scholar
- [9]Hellman, M., “A Cryptanalytic Time-Memory Tradeoff,” IEEE Transactions on Information Theory IT-26(4)(1980).Google Scholar
- [10]Kak, S. and Jayant, N., “On Speech Encryption Using Waveform Scrambling,” Bell System Technical Journal, (1977).Google Scholar
- [11]Kak, S., “Overview of Analog Signal Encryption,” IEEE Proceedings, (1983).Google Scholar
- [12]McEliece, R., “A Public Key Cryptosystem Based on Algebraic Coding Theory,” DSN Progress Rep. 42-44, Jet Propulsion Lab., Cal Inst. of Tech, Pasadena, CA (Jan., Feb. 1978).Google Scholar
- [13]Nashed, M., “Operator-Theoretic and Computational Approaches to Ill-Posed Problems with Apaplications to Antenna Theory,” IEEE Transactions on Antennas and Propogation, (March 1981).Google Scholar
- [14]O’Bryan, T. and Walter, G., “Mean Square Estimation of the Prior Distribution,” Sankya, The Indian Journal of Statistics, (1979).Google Scholar
- [15]Rivest, R., Shamir, A., and Adleman, L., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM Vol 21(2) pp. 120–126 (Feb. 1978).MATHCrossRefMathSciNetGoogle Scholar
- [16]Shannon, C., “Communcation Theory of Secrecy Systems,” Bell Systems Technical Journal 28(1949).Google Scholar
- [17]Stakgold, I., Green’s Functions and Boundary Value Problems, Wiley, New York (1975).Google Scholar
- [18]Tikhonov, A. and Arsenin, V., Solutions of Ill-Posed Problems, Winston-Wiley, New York (1977).MATHGoogle Scholar
- [19]Wyner, A., “An Analog Scrambling Scheme Which Does Not Expand Bandwidth Part II-Continuos Time,” IEEE Transactions on Information Theory IT-25(6)(1979).Google Scholar
- [20]Wyner, A., “An Analog Scrambling Scheme Which Does NOt Expand Bandwidth: Part I-Discrete Time,” IEEE Transactions on Information Theory IT-25(3)(1979).Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 1988