<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">inf21409</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2010.308</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>A Novel Combinatorial Public Key Cryptosystem</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Wang</surname>
						<given-names>Baocang</given-names>
					</name>
					<email xlink:href="mailto:bcwang79@yahoo.com.cn">bcwang79@yahoo.com.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Hu</surname>
						<given-names>Yupu</given-names>
					</name>
					<email xlink:href="mailto:yphu@mail.xidian.edu.cn">yphu@mail.xidian.edu.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an 710071, China</aff>
				<aff id="j_INFORMATICA_aff_001">State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100049, China</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2010</year>
			</pub-date>
			<volume>21</volume>
			<issue>4</issue>
			<fpage>611</fpage>
			<lpage>626</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>02</month>
					<year>2009</year>
				</date>
				<date date-type="accepted">
					<day>01</day>
					<month>04</month>
					<year>2010</year>
				</date>
			</history>
			<abstract>
				<p>Combinatorial problems serve as an important resource for developing practical public key cryptosystems and several combinatorial cryptosystems have been proposed in the cryptographic community. In this paper, a combinatorial public key cryptosystem is proposed. The security of the proposed cryptosystem is dependent on a combinatorial problem involving matrices. The system features fast encryption and decryption. However, the system also suffers from some drawbacks. The ciphertext expansion is relatively large and the key sizes are somewhat larger than that of RSA. The security of the system is carefully examined by illustrating the computational infeasibilities of some attacks on the system.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>public key cryptography</kwd>
				<kwd>combinatorial cryptosystem</kwd>
				<kwd>integer factorization</kwd>
				<kwd>lattice reduction</kwd>
				<kwd>security</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>