Extended multivariate public key cryptosystems with secure encryption function

被引:0
作者
WANG HouZhen 1
2 State Key Laboratory of Software Engineering
机构
基金
国家自然科学基金重大研究计划; 中国国家自然科学基金;
关键词
cryptography; post-quantum cryptography; MQ problem; hash function;
D O I
暂无
中图分类号
TP309.7 [加密与解密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational power, multivariate public key cryptosystems (MPKCs) have attracted increasing attention in recently years. Unfortunately, the existing MPKCs can only be used as a multivariate signature scheme, and it remains unknown how to construct an efficient MPKC enabling secure encryption. Furthermore, some multivariate signature schemes have been shown insecure in recent years, and it is also not trivial to build MPKC which can serve as a secure signature scheme. By employing the basic MQ-trapdoors, this paper proposes a novel MPKC and shows how it can be used as a multivariate signature scheme and a multivariate encryption scheme, respectively. The goal is achieved by incorporating our new hash authentication techniques and some modification methods such as the Shamir’s minus method. Thorough analysis shows that our schemes are secure and efficient. Our MPKC gives a positive response to the challenges in multivariate public key cryptography.
引用
收藏
页码:1161 / 1171
页数:11
相关论文
共 7 条
  • [1] Design theory and method of multivariate hash function[J]. WANG HouZhen 1,2 , ZHANG HuanGuo 1 , WU QianHong 1 , ZHANG Yu 1 , LI ChunLei 1 & ZHANG XinYu 1 1 The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Computer, Wuhan University, Wuhan 430072, China;2 Key Laboratory of Mathematics Mechanization, Beijing 100080, China.Science China(Information Sciences). 2010(10)
  • [2] 多变量代数理论及其在密码学中的应用
    王后珍
    张焕国
    管海明
    伍前红
    [J]. 北京工业大学学报, 2010, 36 (05) : 627 - 634
  • [3] A new perturbation algorithm and enhancing security of SFLASH signature scheme[J]. WANG HouZhen1,2, ZHANG HuanGuo1,2*, GUAN HaiMing3 & HAN HaiQing1,2 1The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan 430072, China;2School of Computer, Wuhan University, Wuhan 430079, China;3Chinese Electronic Equipment System Corporation, Beijing 100039, China.Science China(Information Sciences). 2010(04)
  • [4] Shor整数分解量子算法的加速实现
    付向群
    鲍皖苏
    周淳
    [J]. 科学通报, 2010, 55(Z1) (Z1) : 322 - 327
  • [5] Dixon结式在密码学中的应用
    唐樨瑾
    冯勇
    [J]. 软件学报, 2007, (07) : 1738 - 1745
  • [6] Balanced trustworthiness,safety and privacy in vehicle-to-vehicle communications .2 Wu Q H,Domingo-Ferrer J,Gonza′lez-Nicol′as U. IEEE Trans Veh Technol . 2010
  • [7] Progress in quantum computers abroad,information security challenges and countermeasures .2 Guan H M. Comput Secur . 2009