Provable secure multivariate encryption scheme in standard model

被引:0
作者
Han, Yiliang [1 ]
Yue, Zelun [1 ]
Yang, Xiaoyuan [1 ]
Wei, Yuechuan [1 ]
机构
[1] Department of Electronics Technology, Engineering University of Armed Police Force, Xi'an
来源
Han, Yiliang (yilianghan@hotmail.com) | 1600年 / Huazhong University of Science and Technology卷 / 42期
关键词
Chosen-plaintext attack; Cryptography; Multivariate public key cryptography (MPKC); Networks security; Standard model;
D O I
10.13245/j.hust.141109
中图分类号
学科分类号
摘要
On the three matrixes of the kernel map in simple matrix scheme, an improved method was proposed by adding a random matrix. Based on the new kernel map, a new multivariate public key encryption scheme was proposed. Compared with original scheme, the efficiency of dealing with the plaintext raises 34%. The scheme can resist prevalent attacks, such as the higher-order linearization equations attack and the algebraic attack. Under the standard model, the security of the proposal can be reduced to the problem solving multivariate equations in the finite field. It shows that the proposal keeps the same security as the original scheme, while improves the data processing efficiency. It is a secure and practical scheme. ©, 2014, Huazhong University of Science and Technology. All right reserved.
引用
收藏
页码:47 / 51
页数:4
相关论文
共 9 条
[1]  
Matsumoto T., Imai H., Public quadratic polynomial-tuples for efficient signature-verification and message-encryption, Advances in Cryptology-EuroCrypto'88, pp. 419-453, (1988)
[2]  
Patarin J., Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms, Advances in Cryptology-Eurocrypt'96, pp. 33-48, (1996)
[3]  
Kipnis A., Patarin J., Goubin L., Unbalanced oil and vinegar signature schemes, Advances in Cryptology-EUROCRYPT'99, pp. 206-222, (1999)
[4]  
Ding J., Wolf C., Yang B., l-Invertible cycles for multivariate quadratic (MQ) public key cryptography, Public Key Cryptography, pp. 266-281, (2007)
[5]  
Tsujii S., Itoh T., Fujioka A., Et al., Public-key cryptosystem based on the difficulty of solving a system of nonlinear equations, Electronics Letters, 11, 23, pp. 558-560, (1987)
[6]  
Faugere J.C., A new efficient algorithm for computing Grobner bases, Journal of Pure and Applied Algebra, 139, pp. 61-88, (1999)
[7]  
Faugere J.C., Levy-Dit-Vehel F., Perret L., Cryptanalysis of min-rank, Advances in Cryptology-CRYPTO'2008, pp. 280-296, (2008)
[8]  
Tao C., Diene A., Tang S., Et al., Simple matrix scheme for encryption, Post-quantum Cryptography, pp. 231-242, (2013)
[9]  
Goubin L., Nicolas T.C., Cryptanalysis of the TTM cryptosystem, Advances in Cryptology-AsiaCrypto'2000, pp. 44-57, (2000)