# A Public-Key Cryptosystem Based on Lucas Sequences

@inproceedings{Fadil2012APC, title={A Public-Key Cryptosystem Based on Lucas Sequences}, author={Lhoussain El Fadil}, year={2012} }

Based on Lucas functions, an improved version of Diffie-hellman key distribution, El Gamal public key crypto-system scheme and El Gamal signature scheme are proposed, together with an implementation and com- putational cost. The security relies on the difficulty of factoring an RSA integer and on the difficulty of computing the discrete logarithm.

## One Citation

Anonymous Multi-Receiver Public Key Encryption
Based on Lucas Sequences

- Computer Science
- 2017

The results of the computational analysis show that the projected scheme is better against renown attacks and prevailing anonymous multireceiver algorithms.

## References

SHOWING 1-8 OF 8 REFERENCES

LUC: A New Public Key System

- Computer ScienceSEC
- 1993

A public key system based on Lucas functions instead of exponentiation is introduced, and it is proved that the new system is cryptographically stronger than the RSA system.

The XTR Public Key System

- Computer ScienceCRYPTO
- 2000

This paper introduces the XTR public key system, a new method to represent elements of a subgroup of a multiplicative group of a finite field that leads to substantial savings both in communication and computational overhead without compromising security.

On the Security of the Lucas Function

- Mathematics, Computer ScienceInf. Process. Lett.
- 1995

The security of Lucas function is polynomial-time equivalent to the generalized discrete logarithm problems and is shown to be cryptographically stronger than or at least as strong as the security of exponentiation function.

New directions in cryptography

- Computer ScienceIEEE Trans. Inf. Theory
- 1976

This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

Cryptography - theory and practice

- Computer ScienceDiscrete mathematics and its applications series
- 1995

The object of the book is to produce a general, comprehensive textbook that treats all the essential core areas of cryptography.

A public key cryptosystem and a signature scheme based on discrete logarithms

- Computer ScienceCRYPTO 1984
- 1984

The invention pertains to a novel method of forming a flexible, tapered end on a thermoplastic molding strip that is flexible and virtually free of residual stress which may cause a strip to delaminate when applied to a desired substratum.

Cryptography: Theory and Practice, Third Edition

- Computer Science
- 2005

Cryptography: Theory and Practice, Third Edition (Discrete) by Douglas R. Stinson.

Hellman , New directions in cryptography

- IEEE Trans . Inform . Theory
- 1976