References
Gilmore R. Lie groups, Lie algebras, and Some of Their Applications. Massachusetts: Courier Corporation, 2012
Hall B. Lie Groups, Lie Algebras, and Representations: an Elementary Introduction. Berlin: Springer, 2015
Courtois N, Klimov A, Patarin J, et al. Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Proceeding of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2000. 392–407
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Proceeding of Annual International Cryptology Conference. Berlin: Springer, 2001. 213–229
Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In: Proceeding of Annual International Cryptology Conference. Berlin: Springer, 1999. 537–554
Menezes A J, Wu Y H. The discrete logarithm problem in GL(n, q). Ars Combinatoria, 1997, 47: 23–32
Joux A. Algorithmic Cryptanalysis. Boca Raton: Chapman and Hall/CRC, 2009
Joux A, Odlyzko A, Pierrot C. The past, evolving present, and future of the discrete logarithm. In: Open Problems in Mathematics and Computational Science. Berlin: Springer, 2014. 5–36
Acknowledgements
This work was partially supported by the National Natural Science Foundation of China (NSFC) (Grant Nos. 61602408, 61972050, 61972352, U1709217), Zhejiang Provincial Natural Science Foundation (Grant Nos. LY19F020005, LY18F020009, LZ18F020003), and Key Research and Development Program of Hangzhou (Grant No. 20182011A46).
Author information
Authors and Affiliations
Corresponding author
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Hong, H., Shao, J., Wang, L. et al. A CCA secure public key encryption scheme based on finite groups of Lie type. Sci. China Inf. Sci. 65, 119102 (2022). https://doi.org/10.1007/s11432-019-2704-7
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-2704-7