Optimizing the selection of the secret parameters for public key cryptosystems by using interval linear programming and fully fuzzy linear programming

One of the basic tasks in public key cryptosystems is to determine the secret parameters. This paper proposes multi-objective interval linear programming and multi-objective fully fuzzy linear programming (FFLP) models to determine the optimum interval numbers and triangular fuzzy numbers (TFNs) of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Engineering applications of artificial intelligence Jg. 144; S. 110168
1. Verfasser: Bas, Esra
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Elsevier Ltd 15.03.2025
Schlagworte:
ISSN:0952-1976
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract One of the basic tasks in public key cryptosystems is to determine the secret parameters. This paper proposes multi-objective interval linear programming and multi-objective fully fuzzy linear programming (FFLP) models to determine the optimum interval numbers and triangular fuzzy numbers (TFNs) of the secret parameters in the public key cryptosystems. The public and private (secret) objective function(s) and constraints can be considered such that the optimum interval numbers and optimum TFNs for the secret parameters can be obtained from which the random selection of the secret parameters can be made for each algorithm's execution. Adapting the general model to the Rivest, Shamir, Adleman (RSA) public key cryptosystem is also illustrated. In the interval programming model for the RSA, the linear combination method combines multiple objective functions into a single objective function, and nonlinear constraints are linearized using the Taylor series expansion method. No multiple objective functions are obtained in the FFLP model of the RSA, but the nonlinear constraints are again linearized using the Taylor series expansion method. The numerical application for the RSA public key cryptosystem is made for both models by considering five cases and twenty-four subcases, and the results are analyzed. To the best of our knowledge, there is no study in the literature that considers interval linear programming and/or FFLP to obtain the optimum interval numbers and TFNs for the secret parameters of the public key cryptosystems. The proposed methodology is systematic and generic and can also be adapted for other public key cryptosystems easily.
AbstractList One of the basic tasks in public key cryptosystems is to determine the secret parameters. This paper proposes multi-objective interval linear programming and multi-objective fully fuzzy linear programming (FFLP) models to determine the optimum interval numbers and triangular fuzzy numbers (TFNs) of the secret parameters in the public key cryptosystems. The public and private (secret) objective function(s) and constraints can be considered such that the optimum interval numbers and optimum TFNs for the secret parameters can be obtained from which the random selection of the secret parameters can be made for each algorithm's execution. Adapting the general model to the Rivest, Shamir, Adleman (RSA) public key cryptosystem is also illustrated. In the interval programming model for the RSA, the linear combination method combines multiple objective functions into a single objective function, and nonlinear constraints are linearized using the Taylor series expansion method. No multiple objective functions are obtained in the FFLP model of the RSA, but the nonlinear constraints are again linearized using the Taylor series expansion method. The numerical application for the RSA public key cryptosystem is made for both models by considering five cases and twenty-four subcases, and the results are analyzed. To the best of our knowledge, there is no study in the literature that considers interval linear programming and/or FFLP to obtain the optimum interval numbers and TFNs for the secret parameters of the public key cryptosystems. The proposed methodology is systematic and generic and can also be adapted for other public key cryptosystems easily.
ArticleNumber 110168
Author Bas, Esra
Author_xml – sequence: 1
  givenname: Esra
  orcidid: 0000-0002-7101-3074
  surname: Bas
  fullname: Bas, Esra
  email: atace@itu.edu.tr
  organization: Istanbul Technical University, Department of Industrial Engineering, Macka, 34367, Istanbul, Turkey
BookMark eNqFkE1qwzAQhbVIoUnaKxRdwKkk27K9awn9g0A27VrI8ihVaktGUgLOQXre2iTdFbqZgTfvPYZvgWbWWUDojpIVJZTf71dgd7LvpVkxwvIVndRyhuakyllCq4Jfo0UIe0JIWmZ8jr63fTSdORm7w_ETcIAWVDTOYqcvgvIQcS-97CCCD1g7j_tD3RqFv2DAyg99dGEIEbqA6wEfwlRm7Gg-yha3xoIcE97txopuuknbYH1o22Gcp9Pwh-UGXWnZBri97CX6eH56X78mm-3L2_pxkyiWVzFRRcXKnBecZYowmUsJKde8rqhmpMpkw_OKKKozxkvGSs1ZXvMiSwtapJxTlS4RP_cq70LwoEXvTSf9ICgREzuxF79ExURUnImOwYdzEMbvjga8CMqAVdAYPwIUjTP_VfwADTuKXw
Cites_doi 10.1007/s00500-019-04519-w
10.1016/j.engappai.2023.107581
10.1016/j.apm.2008.10.020
10.1016/j.knosys.2015.09.020
10.1007/s10623-013-9879-3
10.1109/18.54902
10.31181/jdaic10020042023n
10.3390/math11061559
10.1016/j.apm.2013.01.040
10.31181/sor2120257
10.31181/sdmap21202510
10.3390/math11214428
10.1145/359340.359342
10.31181/sor2120256
10.1016/j.apm.2013.02.039
10.1016/j.camwa.2011.11.057
10.1007/BF03024123
10.1016/0165-0114(92)90223-Q
10.1016/j.apm.2010.07.037
10.1016/j.sigpro.2021.108122
10.1016/j.seps.2023.101614
ContentType Journal Article
Copyright 2025 Elsevier Ltd
Copyright_xml – notice: 2025 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.engappai.2025.110168
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Computer Science
ExternalDocumentID 10_1016_j_engappai_2025_110168
S095219762500168X
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AABNK
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AATTM
AAXKI
AAXUO
AAYFN
AAYWO
ABBOA
ABJNI
ABMAC
ACDAQ
ACGFS
ACRLP
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
ADTZH
AEBSH
AECPX
AEIPS
AEKER
AENEX
AEUPX
AFJKZ
AFPUW
AFTJW
AFXIZ
AGCQF
AGHFR
AGRNS
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APXCP
AXJTR
BJAXD
BKOJK
BLXMC
BNPGV
CS3
DU5
EBS
EFJIC
EFKBS
EO8
EO9
EP2
EP3
F5P
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
IHE
J1W
JJJVA
KOM
LG9
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
ROL
RPZ
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TN5
~G-
29G
9DU
AAQXK
AAYXX
ABWVN
ABXDB
ACLOT
ACNNM
ACRPL
ADJOM
ADMUD
ADNMO
AGQPQ
ASPBG
AVWKF
AZFZN
CITATION
EFLBG
EJD
FEDTE
FGOYB
G-2
HLZ
HVGLF
HZ~
R2-
SBC
SET
UHS
WUQ
ZMT
~HD
ID FETCH-LOGICAL-c259t-c7928567624c02a5aae36f6b91f2094ad6590c1f4268228f625b67437173661c3
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001422250600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0952-1976
IngestDate Sat Nov 29 07:52:18 EST 2025
Tue Jul 29 20:15:08 EDT 2025
IsPeerReviewed true
IsScholarly true
Keywords Shamir
Adleman public key cryptosystem
Public key cryptosystem
Multi-objective optimization
Rivest
Interval linear programming
Fully fuzzy linear programming
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c259t-c7928567624c02a5aae36f6b91f2094ad6590c1f4268228f625b67437173661c3
ORCID 0000-0002-7101-3074
ParticipantIDs crossref_primary_10_1016_j_engappai_2025_110168
elsevier_sciencedirect_doi_10_1016_j_engappai_2025_110168
PublicationCentury 2000
PublicationDate 2025-03-15
PublicationDateYYYYMMDD 2025-03-15
PublicationDate_xml – month: 03
  year: 2025
  text: 2025-03-15
  day: 15
PublicationDecade 2020
PublicationTitle Engineering applications of artificial intelligence
PublicationYear 2025
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Kaur, Kumar (bib22) 2013; 37
Abdullah, Saifullah, Almagrabi (bib1) 2023; 11
Dubey, Ratan, Verma, Saxena (bib14) 2014; vol. 258
Baykasoğlu, Subulan (bib4) 2015; 90
Kaur, Kumar (bib23) 2016
Lenstra (bib26) 1984; 6
Hsu, Hou (bib19) 2006; 45
Kaufmann, Gupta (bib21) 1985
Mouha, Wang, Gu, Preneel (bib30) 2012; vol. 7537
Ghanbari, Ghorbani-Moghadam, Mahdavi-Amiri (bib17) 2020; 24
Boneh (bib7) 1999; 46
Jiang, Han, Xie (bib20) 2021
Mukherjee, Gazi, Salahshour, Ghosh, Mondal (bib31) 2023; 13
Rivest, Shamir, Adleman (bib36) 1978; 21
Wu, Yao, An (bib42) 2021; 186
Rivest, Kaliski (bib35) 2011
Farràs, Metcalf-Burton, Padró, Vázquez (bib15) 2010; vol. 5973
Abdullah, Almagrabi, Ullah (bib2) 2023; 11
Zhang, Abdullah, Ullah, Ghani (bib43) 2024; 129
Kolk, Lerman (bib24) 1992
Chiandussi, Codegone, Ferrero, Varesio (bib11) 2012; 63
Li, Li, Lai (bib27) 2015; 74
Wiener (bib41) 1990; 36
Alamin, Rahaman, Mondal (bib3) 2025; 2
Borghoff, Knudsen, Stolpe (bib8) 2009
Caballero-Gil, Hernandez-Goya, Bruno-Castaneda (bib9) 2004
Shamir (bib39) 1982
Rivest, Shamir (bib37) 1986; vol. 219
Gazi, Raisa, Biswas, Azizzadeh, Mondal (bib16) 2024; 2
Narang, Kumar, Dhawan (bib34) 2023; 3
Kumar, Kaur, Singh (bib25) 2011; 35
Liou, Wang (bib28) 1992; 50
Hoffstein, Pipher, Silverman (bib18) 2008
Dehghan, Hashemi, Ghatee (bib13) 2006; 179
Dass, Sharma, Bansal, Nygard (bib12) 2013
Nandi, Granata, Jana, Ghorui, Mondal (bib33) 2023; 88
Ross (bib38) 1995
Smart (bib40) 2016
Najafi, Edalatpanah (bib32) 2013; 37
Biswas, Gazi, Sankar, Ghosh (bib5) 2024; 2
Bleichenbacher (bib6) 1998
Cabrero-Holgueras, Pastrana (bib10) 2023; 229
Lotfi, Allahviranloo, Jondabeh, Alizadeh (bib29) 2009; 33
Liou (10.1016/j.engappai.2025.110168_bib28) 1992; 50
Najafi (10.1016/j.engappai.2025.110168_bib32) 2013; 37
Boneh (10.1016/j.engappai.2025.110168_bib7) 1999; 46
Dubey (10.1016/j.engappai.2025.110168_bib14) 2014; vol. 258
Biswas (10.1016/j.engappai.2025.110168_bib5) 2024; 2
Bleichenbacher (10.1016/j.engappai.2025.110168_bib6) 1998
Kaur (10.1016/j.engappai.2025.110168_bib22) 2013; 37
Abdullah (10.1016/j.engappai.2025.110168_bib1) 2023; 11
Rivest (10.1016/j.engappai.2025.110168_bib35) 2011
Cabrero-Holgueras (10.1016/j.engappai.2025.110168_bib10) 2023; 229
Hoffstein (10.1016/j.engappai.2025.110168_bib18) 2008
Baykasoğlu (10.1016/j.engappai.2025.110168_bib4) 2015; 90
Kaufmann (10.1016/j.engappai.2025.110168_bib21) 1985
Zhang (10.1016/j.engappai.2025.110168_bib43) 2024; 129
Gazi (10.1016/j.engappai.2025.110168_bib16) 2024; 2
Nandi (10.1016/j.engappai.2025.110168_bib33) 2023; 88
Hsu (10.1016/j.engappai.2025.110168_bib19) 2006; 45
Smart (10.1016/j.engappai.2025.110168_bib40) 2016
Lenstra (10.1016/j.engappai.2025.110168_bib26) 1984; 6
Dehghan (10.1016/j.engappai.2025.110168_bib13) 2006; 179
Farràs (10.1016/j.engappai.2025.110168_bib15) 2010; vol. 5973
Ross (10.1016/j.engappai.2025.110168_bib38) 1995
Dass (10.1016/j.engappai.2025.110168_bib12) 2013
Narang (10.1016/j.engappai.2025.110168_bib34) 2023; 3
Lotfi (10.1016/j.engappai.2025.110168_bib29) 2009; 33
Kumar (10.1016/j.engappai.2025.110168_bib25) 2011; 35
Shamir (10.1016/j.engappai.2025.110168_bib39) 1982
Mouha (10.1016/j.engappai.2025.110168_bib30) 2012; vol. 7537
Borghoff (10.1016/j.engappai.2025.110168_bib8) 2009
Li (10.1016/j.engappai.2025.110168_bib27) 2015; 74
Chiandussi (10.1016/j.engappai.2025.110168_bib11) 2012; 63
Ghanbari (10.1016/j.engappai.2025.110168_bib17) 2020; 24
Kolk (10.1016/j.engappai.2025.110168_bib24) 1992
Wu (10.1016/j.engappai.2025.110168_bib42) 2021; 186
Alamin (10.1016/j.engappai.2025.110168_bib3) 2025; 2
Rivest (10.1016/j.engappai.2025.110168_bib37) 1986; vol. 219
Mukherjee (10.1016/j.engappai.2025.110168_bib31) 2023; 13
Jiang (10.1016/j.engappai.2025.110168_bib20) 2021
Abdullah (10.1016/j.engappai.2025.110168_bib2) 2023; 11
Caballero-Gil (10.1016/j.engappai.2025.110168_bib9) 2004
Rivest (10.1016/j.engappai.2025.110168_bib36) 1978; 21
Wiener (10.1016/j.engappai.2025.110168_bib41) 1990; 36
Kaur (10.1016/j.engappai.2025.110168_bib23) 2016
References_xml – volume: 11
  start-page: 1559
  year: 2023
  ident: bib2
  article-title: New approach to artificial intelligent based three-way decision making and analyzing s-box image encryption using TOPSIS method
  publication-title: Mathematics
– volume: 6
  start-page: 14
  year: 1984
  end-page: 21
  ident: bib26
  article-title: Integer programming and cryptography
  publication-title: Math. Intel.
– year: 2008
  ident: bib18
  article-title: An Introduction to Mathematical Cryptography
– volume: 35
  start-page: 817
  year: 2011
  end-page: 823
  ident: bib25
  article-title: A new method for solving fully fuzzy linear programming problems
  publication-title: Appl. Math. Model.
– year: 1982
  ident: bib39
  article-title: A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem
– start-page: 126
  year: 2013
  end-page: 131
  ident: bib12
  article-title: Meta heuristics for prime factorization problem
  publication-title: World Congress on Nature and Biologically Inspired Computing
– volume: 3
  start-page: 33
  year: 2023
  end-page: 46
  ident: bib34
  article-title: A fuzzy extension of MEREC method using parabolic measure and its applications
  publication-title: J. Decis. Anal. Int. Comp.
– volume: 90
  start-page: 165
  year: 2015
  end-page: 184
  ident: bib4
  article-title: An analysis of fully fuzzy linear programming with fuzzy decision variables through logistics network design problem
  publication-title: Knowl.-Based Syst.
– start-page: 773
  year: 2004
  end-page: 777
  ident: bib9
  article-title: A game-theoretic model for two-party cryptographic protocols
  publication-title: International Conference on Information Technology: Coding and Computing
– volume: 33
  start-page: 3151
  year: 2009
  end-page: 3156
  ident: bib29
  article-title: Solving a full fuzzy linear programming using lexicography method and fuzzy approximate solution
  publication-title: Appl. Math. Model.
– year: 1992
  ident: bib24
  article-title: Linearization
  publication-title: Nonlinear System Dynamics
– volume: 37
  start-page: 7142
  year: 2013
  end-page: 7153
  ident: bib22
  article-title: Mehar's method for solving fully fuzzy linear programming problems with L-R fuzzy parameters
  publication-title: Appl. Math. Model.
– volume: 129
  year: 2024
  ident: bib43
  article-title: A new approach to neural network via double hierarchy linguistic information: application in robot selection
  publication-title: Eng. Appl. Artif. Intell.
– volume: 46
  start-page: 203
  year: 1999
  end-page: 213
  ident: bib7
  article-title: Twenty years of attacks on the RSA cryptosystem
  publication-title: Not. Am. Math. Soc.
– year: 2011
  ident: bib35
  article-title: RSA problem
  publication-title: Encyclopedia of Cryptography and Security
– year: 1995
  ident: bib38
  article-title: Fuzzy Logic with Engineering Applications
– volume: 2
  start-page: 61
  year: 2025
  end-page: 71
  ident: bib3
  article-title: Geometric approach for solving first order non-homogenous fuzzy difference equation
  publication-title: Spec. Oper. Res.
– volume: 74
  start-page: 623
  year: 2015
  end-page: 644
  ident: bib27
  article-title: Optimal assignment schemes for general access structures based on linear programming
  publication-title: Des. Codes Cryptogr.
– volume: vol. 258
  year: 2014
  ident: bib14
  article-title: Cryptanalytic attacks and countermeasures on RSA
  publication-title: Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing
– volume: 179
  start-page: 328
  year: 2006
  end-page: 343
  ident: bib13
  article-title: Computational methods for solving fully fuzzy linear systems
  publication-title: Appl. Math. Comput.
– year: 1985
  ident: bib21
  article-title: Introduction to Fuzzy Arithmetic Theory and Applications
– volume: 186
  year: 2021
  ident: bib42
  article-title: Extended XOR-based visual cryptography schemes by integer linear program
  publication-title: Signal Process.
– year: 2021
  ident: bib20
  article-title: The basic principles of interval analysis
  publication-title: Nonlinear Interval Optimization for Uncertain Problems. Springer Tracts in Mechanical Engineering
– year: 2009
  ident: bib8
  article-title: Bivium as a mixed-integer linear programming problem
  publication-title: Cryptography and Coding. IMACC 2009
– volume: 36
  start-page: 553
  year: 1990
  end-page: 558
  ident: bib41
  article-title: Cryptanalysis of short RSA secret exponents
  publication-title: IEEE Trans. Inf. Theor.
– volume: 11
  start-page: 4428
  year: 2023
  ident: bib1
  article-title: An integrated group decision-making framework for the evaluation of artificial intelligence cloud platforms based on fractional fuzzy sets
  publication-title: Mathematics
– volume: 229
  year: 2023
  ident: bib10
  article-title: Towards automated homomorphic encryption parameter selection with fuzzy logic and linear programming
  publication-title: Expert Syst. Appl.
– year: 2016
  ident: bib23
  article-title: Fuzzy optimal solution of fully fuzzy linear programming problems with inequality constraints having LR flat fuzzy numbers
  publication-title: An Introduction to Fuzzy Linear Programming Problems. Studies in Fuzziness and Soft Computing
– volume: 45
  year: 2006
  ident: bib19
  article-title: Goal-programming-assisted visual cryptography method with unexpanded shadow images for general access structures
  publication-title: Opt. Eng.
– volume: 2
  start-page: 1
  year: 2024
  end-page: 26
  ident: bib5
  article-title: A decision-making framework for sustainable highway restaurant site selection: AHP-TOPSIS approach based on the fuzzy numbers
  publication-title: Spec. Oper. Res.
– year: 1998
  ident: bib6
  article-title: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
  publication-title: Advances in Cryptology - CRYPTO '98
– volume: 21
  start-page: 120
  year: 1978
  end-page: 126
  ident: bib36
  article-title: A method for obtaining digital signature and public-key cryptosystems
  publication-title: Commun. ACM
– volume: vol. 219
  year: 1986
  ident: bib37
  article-title: Efficient factoring based on partial information
  publication-title: Advances in Cryptology-EUROCRYPT’ 85
– volume: 2
  start-page: 28
  year: 2024
  end-page: 52
  ident: bib16
  article-title: Finding most important criteria in women's empowerment for sports sector by pentagonal fuzzy DEMATEL methodology
  publication-title: Spec. Decis. Mak. Appl.
– volume: 24
  start-page: 10043
  year: 2020
  end-page: 10073
  ident: bib17
  article-title: Fuzzy linear programming problems: models and solutions
  publication-title: Soft Comput.
– volume: vol. 5973
  year: 2010
  ident: bib15
  article-title: On the optimization of bipartite secret sharing schemes
  publication-title: Information Theoretic Security. ICITS 2009
– volume: 13
  year: 2023
  ident: bib31
  article-title: A brief analysis and interpretation on arithmetic operations of fuzzy numbers
  publication-title: Results Control Optim
– volume: 63
  start-page: 912
  year: 2012
  end-page: 942
  ident: bib11
  article-title: Comparison of multi-objective optimization methodologies for engineering applications
  publication-title: Comput. Math. Appl.
– volume: 88
  year: 2023
  ident: bib33
  article-title: Evaluation of the treatment options for COVID-19 patients using generalized hesitant fuzzy- multi criteria decision making techniques
  publication-title: Soc. Econ. Plann. Sci.
– volume: vol. 7537
  year: 2012
  ident: bib30
  article-title: Differential and linear cryptanalysis using mixed-integer linear programming
  publication-title: Information Security and Cryptology. Inscrypt 2011
– year: 2016
  ident: bib40
  article-title: Primality testing and factoring
  publication-title: Cryptography Made Simple. Information Security and Cryptography
– volume: 50
  start-page: 247
  year: 1992
  end-page: 255
  ident: bib28
  article-title: Ranking fuzzy numbers with integral value
  publication-title: Fuzzy Set Syst.
– volume: 37
  start-page: 7865
  year: 2013
  end-page: 7867
  ident: bib32
  article-title: A note on “A new method for solving fully fuzzy linear programming problems”
  publication-title: Appl. Math. Model.
– volume: 24
  start-page: 10043
  year: 2020
  ident: 10.1016/j.engappai.2025.110168_bib17
  article-title: Fuzzy linear programming problems: models and solutions
  publication-title: Soft Comput.
  doi: 10.1007/s00500-019-04519-w
– volume: 129
  year: 2024
  ident: 10.1016/j.engappai.2025.110168_bib43
  article-title: A new approach to neural network via double hierarchy linguistic information: application in robot selection
  publication-title: Eng. Appl. Artif. Intell.
  doi: 10.1016/j.engappai.2023.107581
– volume: 33
  start-page: 3151
  issue: 7
  year: 2009
  ident: 10.1016/j.engappai.2025.110168_bib29
  article-title: Solving a full fuzzy linear programming using lexicography method and fuzzy approximate solution
  publication-title: Appl. Math. Model.
  doi: 10.1016/j.apm.2008.10.020
– year: 1992
  ident: 10.1016/j.engappai.2025.110168_bib24
  article-title: Linearization
– volume: 229
  issue: Part A
  year: 2023
  ident: 10.1016/j.engappai.2025.110168_bib10
  article-title: Towards automated homomorphic encryption parameter selection with fuzzy logic and linear programming
  publication-title: Expert Syst. Appl.
– year: 2011
  ident: 10.1016/j.engappai.2025.110168_bib35
  article-title: RSA problem
– volume: 90
  start-page: 165
  year: 2015
  ident: 10.1016/j.engappai.2025.110168_bib4
  article-title: An analysis of fully fuzzy linear programming with fuzzy decision variables through logistics network design problem
  publication-title: Knowl.-Based Syst.
  doi: 10.1016/j.knosys.2015.09.020
– year: 2009
  ident: 10.1016/j.engappai.2025.110168_bib8
  article-title: Bivium as a mixed-integer linear programming problem
– volume: 74
  start-page: 623
  year: 2015
  ident: 10.1016/j.engappai.2025.110168_bib27
  article-title: Optimal assignment schemes for general access structures based on linear programming
  publication-title: Des. Codes Cryptogr.
  doi: 10.1007/s10623-013-9879-3
– volume: 36
  start-page: 553
  issue: 3
  year: 1990
  ident: 10.1016/j.engappai.2025.110168_bib41
  article-title: Cryptanalysis of short RSA secret exponents
  publication-title: IEEE Trans. Inf. Theor.
  doi: 10.1109/18.54902
– start-page: 126
  year: 2013
  ident: 10.1016/j.engappai.2025.110168_bib12
  article-title: Meta heuristics for prime factorization problem
– volume: 45
  issue: 9
  year: 2006
  ident: 10.1016/j.engappai.2025.110168_bib19
  article-title: Goal-programming-assisted visual cryptography method with unexpanded shadow images for general access structures
  publication-title: Opt. Eng.
– volume: 3
  start-page: 33
  issue: 1
  year: 2023
  ident: 10.1016/j.engappai.2025.110168_bib34
  article-title: A fuzzy extension of MEREC method using parabolic measure and its applications
  publication-title: J. Decis. Anal. Int. Comp.
  doi: 10.31181/jdaic10020042023n
– year: 2016
  ident: 10.1016/j.engappai.2025.110168_bib40
  article-title: Primality testing and factoring
– volume: 11
  start-page: 1559
  year: 2023
  ident: 10.1016/j.engappai.2025.110168_bib2
  article-title: New approach to artificial intelligent based three-way decision making and analyzing s-box image encryption using TOPSIS method
  publication-title: Mathematics
  doi: 10.3390/math11061559
– volume: 37
  start-page: 7142
  issue: 12–13
  year: 2013
  ident: 10.1016/j.engappai.2025.110168_bib22
  article-title: Mehar's method for solving fully fuzzy linear programming problems with L-R fuzzy parameters
  publication-title: Appl. Math. Model.
  doi: 10.1016/j.apm.2013.01.040
– volume: 2
  start-page: 61
  issue: 1
  year: 2025
  ident: 10.1016/j.engappai.2025.110168_bib3
  article-title: Geometric approach for solving first order non-homogenous fuzzy difference equation
  publication-title: Spec. Oper. Res.
  doi: 10.31181/sor2120257
– volume: 2
  start-page: 28
  year: 2024
  ident: 10.1016/j.engappai.2025.110168_bib16
  article-title: Finding most important criteria in women's empowerment for sports sector by pentagonal fuzzy DEMATEL methodology
  publication-title: Spec. Decis. Mak. Appl.
  doi: 10.31181/sdmap21202510
– volume: vol. 7537
  year: 2012
  ident: 10.1016/j.engappai.2025.110168_bib30
  article-title: Differential and linear cryptanalysis using mixed-integer linear programming
– volume: 11
  start-page: 4428
  year: 2023
  ident: 10.1016/j.engappai.2025.110168_bib1
  article-title: An integrated group decision-making framework for the evaluation of artificial intelligence cloud platforms based on fractional fuzzy sets
  publication-title: Mathematics
  doi: 10.3390/math11214428
– volume: 21
  start-page: 120
  issue: 2
  year: 1978
  ident: 10.1016/j.engappai.2025.110168_bib36
  article-title: A method for obtaining digital signature and public-key cryptosystems
  publication-title: Commun. ACM
  doi: 10.1145/359340.359342
– year: 2021
  ident: 10.1016/j.engappai.2025.110168_bib20
  article-title: The basic principles of interval analysis
– volume: 2
  start-page: 1
  issue: 1
  year: 2024
  ident: 10.1016/j.engappai.2025.110168_bib5
  article-title: A decision-making framework for sustainable highway restaurant site selection: AHP-TOPSIS approach based on the fuzzy numbers
  publication-title: Spec. Oper. Res.
  doi: 10.31181/sor2120256
– year: 1998
  ident: 10.1016/j.engappai.2025.110168_bib6
  article-title: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
– volume: 37
  start-page: 7865
  issue: 14–15
  year: 2013
  ident: 10.1016/j.engappai.2025.110168_bib32
  article-title: A note on “A new method for solving fully fuzzy linear programming problems”
  publication-title: Appl. Math. Model.
  doi: 10.1016/j.apm.2013.02.039
– volume: vol. 5973
  year: 2010
  ident: 10.1016/j.engappai.2025.110168_bib15
  article-title: On the optimization of bipartite secret sharing schemes
– year: 1985
  ident: 10.1016/j.engappai.2025.110168_bib21
– volume: 13
  year: 2023
  ident: 10.1016/j.engappai.2025.110168_bib31
  article-title: A brief analysis and interpretation on arithmetic operations of fuzzy numbers
  publication-title: Results Control Optim
– volume: 63
  start-page: 912
  year: 2012
  ident: 10.1016/j.engappai.2025.110168_bib11
  article-title: Comparison of multi-objective optimization methodologies for engineering applications
  publication-title: Comput. Math. Appl.
  doi: 10.1016/j.camwa.2011.11.057
– year: 2016
  ident: 10.1016/j.engappai.2025.110168_bib23
  article-title: Fuzzy optimal solution of fully fuzzy linear programming problems with inequality constraints having LR flat fuzzy numbers
– volume: 6
  start-page: 14
  year: 1984
  ident: 10.1016/j.engappai.2025.110168_bib26
  article-title: Integer programming and cryptography
  publication-title: Math. Intel.
  doi: 10.1007/BF03024123
– year: 1995
  ident: 10.1016/j.engappai.2025.110168_bib38
– volume: 179
  start-page: 328
  issue: 1
  year: 2006
  ident: 10.1016/j.engappai.2025.110168_bib13
  article-title: Computational methods for solving fully fuzzy linear systems
  publication-title: Appl. Math. Comput.
– year: 2008
  ident: 10.1016/j.engappai.2025.110168_bib18
– volume: 50
  start-page: 247
  year: 1992
  ident: 10.1016/j.engappai.2025.110168_bib28
  article-title: Ranking fuzzy numbers with integral value
  publication-title: Fuzzy Set Syst.
  doi: 10.1016/0165-0114(92)90223-Q
– volume: vol. 219
  year: 1986
  ident: 10.1016/j.engappai.2025.110168_bib37
  article-title: Efficient factoring based on partial information
– volume: 35
  start-page: 817
  issue: 2
  year: 2011
  ident: 10.1016/j.engappai.2025.110168_bib25
  article-title: A new method for solving fully fuzzy linear programming problems
  publication-title: Appl. Math. Model.
  doi: 10.1016/j.apm.2010.07.037
– volume: 186
  year: 2021
  ident: 10.1016/j.engappai.2025.110168_bib42
  article-title: Extended XOR-based visual cryptography schemes by integer linear program
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2021.108122
– start-page: 773
  year: 2004
  ident: 10.1016/j.engappai.2025.110168_bib9
  article-title: A game-theoretic model for two-party cryptographic protocols
– volume: 46
  start-page: 203
  year: 1999
  ident: 10.1016/j.engappai.2025.110168_bib7
  article-title: Twenty years of attacks on the RSA cryptosystem
  publication-title: Not. Am. Math. Soc.
– volume: vol. 258
  year: 2014
  ident: 10.1016/j.engappai.2025.110168_bib14
  article-title: Cryptanalytic attacks and countermeasures on RSA
– year: 1982
  ident: 10.1016/j.engappai.2025.110168_bib39
– volume: 88
  year: 2023
  ident: 10.1016/j.engappai.2025.110168_bib33
  article-title: Evaluation of the treatment options for COVID-19 patients using generalized hesitant fuzzy- multi criteria decision making techniques
  publication-title: Soc. Econ. Plann. Sci.
  doi: 10.1016/j.seps.2023.101614
SSID ssj0003846
Score 2.4208257
Snippet One of the basic tasks in public key cryptosystems is to determine the secret parameters. This paper proposes multi-objective interval linear programming and...
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 110168
SubjectTerms Adleman public key cryptosystem
Fully fuzzy linear programming
Interval linear programming
Multi-objective optimization
Public key cryptosystem
Rivest
Shamir
Title Optimizing the selection of the secret parameters for public key cryptosystems by using interval linear programming and fully fuzzy linear programming
URI https://dx.doi.org/10.1016/j.engappai.2025.110168
Volume 144
WOSCitedRecordID wos001422250600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  issn: 0952-1976
  databaseCode: AIEXJ
  dateStart: 19950201
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0003846
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELag5cCF8lQfgObAbZWSd-JjVRUBQgWJIu0tcpwEbaXNrpIUdfeH9Pd2xhNvUlgJEOJiRZbjRJkvzufJzDdCvMnDMgp0FDhId1MnDIvcUbmSjg5jTyd5FBesrv8pOT9Pp1P5pQ8rak05gaSu0-trufyvpsY-NDalzv6FuTeTYgceo9GxRbNj-0eG_4yLwHy2tmlQrSl009NC7kCi2E1I83tOsTBGkMHKXeMrPdHNatktWOK5JXp61XLiC0VHokWJmJJANkd2zW2WIznyV9iu16stQ-78ARg0ECfjH-gmJqExwUumlMhILXRwuHL6RNuosb_CjyhgizM22YlmE2mGqCX2RvqOJ7kUzGZhZmXIXxZ59jdcHpf1d7xJNTumy1A-g8cVen4S0P5Kk9PcyPZoyPS-2PWTSOIyvnvy4Wz6cfPlDlJO7LI3M8oo33617WRmRFAuHotH_c4CThgRT8S9sn4q9vpdBvRreItdtpCH7XsmbgbMAEIENpiBRdV3EGZgwAwgZoAxA4gZuIMZyFdgMAMWM8CAgBEgADEDBjNgMLNlyHPx7d3Zxel7py_Y4WjcRXeOTqSfRjE-6VC7voqUKoO4inPpVb4rQ1XEkXS1VyErRF6aVmiRnJJgKBIEeaIOXoidelGX-wLSQvkSdw-56xVhpFypkUaRPht-f_CzlB6It_bJZ0vWZclswOJlZm2Vka0yttWBkNZAWc8umTVmiKvfnHv4D-ceiYfDa_BS7HTNVflKPNA_ulnbvO4heAv6Y6wi
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optimizing+the+selection+of+the+secret+parameters+for+public+key+cryptosystems+by+using+interval+linear+programming+and+fully+fuzzy+linear+programming&rft.jtitle=Engineering+applications+of+artificial+intelligence&rft.au=Bas%2C+Esra&rft.date=2025-03-15&rft.pub=Elsevier+Ltd&rft.issn=0952-1976&rft.volume=144&rft_id=info:doi/10.1016%2Fj.engappai.2025.110168&rft.externalDocID=S095219762500168X
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0952-1976&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0952-1976&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0952-1976&client=summon