Indistinguishability and Non-deterministic Encryption of the Quantum Safe Multivariate Polynomial Public Key Cryptographic System

被引:6
作者
Kuang, Randy [1 ]
Barbeau, Michel [2 ]
机构
[1] Quantropi Inc, Ottawa, ON, Canada
[2] Carleton Univ, Ottawa, ON, Canada
来源
2021 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE) | 2021年
关键词
Public key cryptography; secure secret exchange; polynomial factoring; polynomial root finding; MPPK; Multivariate Polynomial Public Key; Post-Quantum Cryptography; PQC; non-deterministic encryption;
D O I
10.1109/CCECE53047.2021.9569200
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multivariate Polynomial Public Key (MPPK) is a cryptographic system, over a prime Galois field. A key pair is generated using a multiplier multivariate polynomial and two multiplicand univariate solvable polynomials. They yield two product multivariate polynomials. The first variable is used for carrying the message or secret and others are used as noise sources. The public key consists of all the coefficients of the product multivariate polynomials, except the two constant coefficients, in terms with coefficients attached to the message variable, and a noise function or a polynomial of only noise variables generated from the constant term of the multiplier multivariate polynomial by multiplying a private random variable R. The private key is made of both univariate solvable multiplicand polynomials and the private R. Encryption takes a secret message and random numbers for noises, adding noise that is automatically cancelled by decryption. Decryption is achieved evaluating a solvable equation. We review security analysis that can be employed to crack MPPK secrets and private keys. Finally, we discuss indistinguishability and non-deterministic encryption, key properties of MPPK.
引用
收藏
页数:5
相关论文
共 13 条
[1]  
Alwen J, 2013, LECT NOTES COMPUT SC, V8042, P57, DOI 10.1007/978-3-642-40041-4_4
[2]  
Banerjee A, 2012, LECT NOTES COMPUT SC, V7237, P719, DOI 10.1007/978-3-642-29011-4_42
[3]   Efficient Compression of SIDH Public Keys [J].
Costello, Craig ;
Jao, David ;
Longa, Patrick ;
Naehrig, Michael ;
Renes, Joost ;
Urbanik, David .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 :679-706
[4]   Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies [J].
De Feo, Luca ;
Jao, David ;
Plut, Jerome .
JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2014, 8 (03) :209-247
[5]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[6]   Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography [J].
Genise, Nicholas ;
Micciancio, Daniele ;
Peikert, Chris ;
Walter, Michael .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2020, PT I, 2020, 12110 :623-651
[7]   PROBABILISTIC ENCRYPTION [J].
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) :270-299
[8]  
Hoffstein J., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P267, DOI 10.1007/BFb0054868
[9]  
Kuang R., 2021, UNPUB
[10]  
Lyubashevsky V, 2013, LECT NOTES COMPUT SC, V7881, P35, DOI 10.1007/978-3-642-38348-9_3