6 EXPERIMENTAL RESULTS
As we mentioned above, we can use the secret
sharing scheme for access control with multiple
identities authentication. The following are our
experiments on timing results based on the method
in Section 4, compared with the timing results on the
batch Schnorr scheme (Genaro, et. al., 2004) with
the same number of identities. As for the selections
of security parameters, they chose the following
setting:
Number of identities: d = 32
Prime number q: let q be 200 bits
Prime number p: let p be about 1500 bits
Microchip PIC16LF628 microcontroller
Runnig time: about 2 seconds on
The implementation of our scheme is in the C
language on a Linux machine with a Celeron
processor with 2.2 GHz. In order to treat two
schemes under the same condition, our selections of
security parameters are set as follows:
Number of identities: d = 32
Number of items: n = 75
Number of kinds: m = 10
Number of mask bits for each item: l = 20
Each mask pattern’s length: ln = 20*75 = 1500
Prime number p: p > 2
ln
. So p > 2
1500
, p is of 451
decimal digits, which has a comparable size with the
batch Schnorr scheme.
Those parameters are set to match the
performance measurement of the batch Schnorr. For
our experiment we did encryption/decryption of a
file with about 50 characters as a challenge with the
total time of 0.057 sec. The memory requirement for
the above selections of security parameters is 0.134
MB.
7 CONCLUDING REMARKS
We presented a new crypto-system based on the
non-linear knapsack problem. At the moment, there
is no attacking method for this crypto-system. The
computational complexity of our system is low, and
thus very efficient in practice. Also the simple
structure is suitable for hardware implementation,
especially as the bitwise “and” operation can be
executed by a logic array in parallel. Only one
problem is that the key size is rather large, that is,
O(lmn
2
), whereas that of RSA is O(n). As the cost of
memory chip is going down, this disadvantage will
not be a great obstacle to our system.
We extended our system for encrypted secret
sharing. This became possible as our non-linear
system is not exactly “non-linear”, but “super-
linear”, in the sense that we have non-linear
functions at the bottom, which are gathered by the
linear operation of summation. We incorporated
linear algebra into this linear part at the top. There
can be more generalizations from various angles.
REFERENCES
Adelman, L., 1983. On breaking generalized knapsack
public-key cryptosystems, Porc. ACM Symp. On
Theory of Computing 1983, pp402-412
Borovoy, R et. al., 1996. Things that blink:
Computationally augmented name tags, IBM System
Journal, vol. 35, no. 3 & 4, pp488-493
Chor, B. and R. L. Rivest. A, 1985. Knapsack type public
key cryptosystem based on arithmetic finite fields,
IEEE Trans. on Information Theory, IT-34, 1988,
pp901-909
Diffie, W. and M. Hellman, 1976. New directions in
cryptography, IEEE Trans. on Information Theory, IT-
22, 6, pp644-654
ElGamal, T., 1985. A public key cryptosystem based on
discrete logarithms, IEEE Trans. On Information
Theory, IT-31, 4, pp469-472
Gennaro, R., D. Leigh, R. Sundaram, and William, 2004.
Batching Schnorr identification scheme with
applications to privacy-preserving authorization and
low-bandwidth communication devices, AsiaCrypt 04,
LNCS 3329, pp276-292
Hsi, S and Fait, H., 2005. RFID enhances visitors’
museum experience at the exploratorium, CACM vol.
48, no. 9, pp 60-65
Lagarias, J. C., A. M. Odlyzko, 1985. Solving low density
subset sum problems, JACM, vol. 32, 229- 246
Lenstra, A. K., H. W. Lenstra, Jr. and L. Lovasz, 1982,
Factoring polynomials with rational coefficients,
Math. Ann. 261
Merkle, L. C. and M. E. Hellman, 1978. Hiding
information and signatures in trapdoor knapsacks,
IEEE Trans. on Inf. Theory, 24, pp525-530
Ohkubo, M., Suzuki, K., and Kinoshita, S., 2005. RFID
privacy issues and technical challenges, CACM vol
48, no 9, pp 66-71
Raskar, R, Beardsley, P, Dietz, P, and van Baar, J, 2005.
Photosensing wireless tags for geometric procesures,
CACM vol 48, no. 9, pp 46-51
Rivest, R. L., A. Shamir and L. Adelman, 1978. A method
for obtaining digital signatures and public-key
cryptosystems, CACM, 21, 2, pp120-126
Schnorr, C. P., 1991. Efficient signature generation by
smart cards, J. of Cryptology, 4, 3, pp161-174,
Shamir, A, 1979. How to share a secret, CACM vol. 22,
no. 11, pp612-613
Shamir, A., 1982. A polynomial time algorithm for
breaking the basic Merkle-Hellman cryptosystem,
FOCS 1982: 145-152
A NEW PUBLIC-KEY CRYPTOSYSTEM AND ITS APPLICATIONS
529