Post-quantum Commutative Deniable Encryption Algorithm

There is proposed a new post-quantum commutative encryption algorithm based on the hidden discrete logarithm problem. The introduced cipher is suitable for implementing post-quantum pseudo-probabilistic deniable encryption protocol. The proposed commutative cipher belongs to the class of the algebraic ciphers. Its algebraic support represents a finite noncommutative associative algebra of special type. The used algebra is characterized in existence of a large set of the global right-sided units that are used to define the homomorphism map of the algebra and then to define the hidden discrete logarithm problem using the mutual commutativity of the homomorphism-map operation and the exponentiation operation. The proposed commutative cipher is the first implementation of the post-quantum commutative ciphers based on the hidden discrete logarithm problem defined in a finite algebra that contains no two-sided global unit.

[1]  Rafail Ostrovsky,et al.  Efficient Non-interactive Secure Computation , 2011, EUROCRYPT.

[2]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[3]  Duc Tam Nguyen,et al.  Method for Pseudo-probabilistic Block Encryption , 2017, INISCOM.

[4]  Alexander A. Nechaev,et al.  Cryptographic Algorithms on Groups and Algebras , 2017 .

[5]  Maged Hamada Ibrahim,et al.  A Method for Obtaining Deniable Public-Key Encryption , 2009, Int. J. Netw. Secur..

[6]  Tamer M. Barakat,et al.  A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption , 2014, KSII Trans. Internet Inf. Syst..

[7]  Nikolay A. Moldovyan,et al.  Post-quantum signature algorithms based on the hidden discrete logarithm problem , 2018, Comput. Sci. J. Moldova.

[8]  A. A. Moldovyan,et al.  Finite Non-Commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem , 2019, Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software".

[9]  Tanja Lange,et al.  Preface: Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings , 2018 .

[10]  Duc Tam Nguyen,et al.  Deniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic Ciphering , 2018 .

[11]  Duc Tam Nguyen,et al.  No-Key Protocol for Deniable Encryption , 2018 .

[12]  Nikolay A. Moldovyan,et al.  Stream Deniable-Encryption Algorithms , 2016, Comput. Sci. J. Moldova.

[13]  Rafail Ostrovsky,et al.  Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..

[14]  Bo Meng,et al.  A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext , 2009, J. Networks.

[15]  Duc Tam Nguyen,et al.  Pseudo-probabilistic block ciphers and their randomization , 2019, J. Ambient Intell. Humaniz. Comput..