Practical cryptography in high dimensional tori

20Citations
Citations of this article
46Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

At Crypto 2004, van Dijk and Woodruff introduced a new way of using the algebraic tori Tn in cryptography, and obtained an asymptotically optimal n/φ (n) savings in bandwidth and storage for a number of cryptographic applications. However, the computational requirements of compression and decompression in their scheme were impractical, and it was left open to reduce them to a practical level. We give a new method that compresses orders of magnitude faster than the original, while also speeding up the decompression and improving on the compression factor (by a constant term). Further, we give the first efficient implementation that uses T30, compare its performance to XTR, CEILIDH, and ECC, and present new applications. Our methods achieve better compression than XTR and CEILIDH for the compression of as few as two group elements. This allows us to apply our results to ElGamal encryption with a small message domain to obtain ciphertexts that are 10% smaller than in previous schemes. © International Association for Cryptologic Research 2005.

Cite

CITATION STYLE

APA

Van Dijk, M., Granger, R., Page, D., Rubin, K., Silverberg, A., Stam, M., & Woodruff, D. (2005). Practical cryptography in high dimensional tori. In Lecture Notes in Computer Science (Vol. 3494, pp. 234–250). Springer Verlag. https://doi.org/10.1007/11426639_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free