A Multivariate Public Key Cryptographic Scheme

被引:2
|
作者
Yuan Feng [1 ]
Sun Ying [1 ]
Jiang Jijun [1 ]
Zhao Shangwei [2 ]
Xu Shengwei [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Informat Secur Inst, Beijing 100070, Peoples R China
[2] Minzu Univ China, Coll Sci, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
public key cryptography; polynomials; multivariate; finite field; SQUARE;
D O I
10.1109/CC.2014.7019846
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic. The idea of embedding and layering is manifested in its construction. The security of the scheme is analyzed in detail, and this paper indicates that the scheme can withstand the up to date differential cryptanalysis. We give heuristic arguments to show that this scheme resists all known attacks.
引用
收藏
页码:120 / 124
页数:5
相关论文
共 50 条
  • [21] Comparative performance analysis of public-key cryptographic operations in the WTLS handshake protocol
    Rodríguez-Henríquez, F
    López-Peza, CE
    León-Chávez, MA
    2004 1st International Conference on Electrical and Electronics Engineering (ICEEE), 2004, : 124 - 129
  • [22] Cryptanalysis on Public Key Encryption Scheme Using Ergodic Matrices over GF(2)
    Gu Chun-sheng
    Yu Zhi-ming
    Jing Zheng-jun
    Gu Jixing
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 93 - 96
  • [23] Performance Analysis of the Quantum Safe Multivariate Polynomial Public Key Algorithm
    Kuang, Randy
    Barbeau, Michel
    2021 IEEE INTERNATIONAL CONFERENCE ON QUANTUM COMPUTING AND ENGINEERING (QCE 2021) / QUANTUM WEEK 2021, 2021, : 351 - 358
  • [24] Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions
    Ge Wu
    Jian-Chang Lai
    Fu-Chun Guo
    Willy Susilo
    Fu-Tai Zhang
    Journal of Computer Science and Technology, 2019, 34 : 1366 - 1379
  • [25] Towards data storage in cryptographic systems: an efficient hardware architecture based on multivariate scheme for secure storage applications
    Yi, Haibo
    Nie, Zhe
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S8639 - S8646
  • [26] Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status
    Imam, Raza
    Areeb, Qazi Mohammad
    Alturki, Abdulrahman
    Anwer, Faisal
    IEEE ACCESS, 2021, 9 : 155949 - 155976
  • [27] Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions
    Wu, Ge
    Lai, Jian-Chang
    Guo, Fu-Chun
    Susilo, Willy
    Zhang, Fu-Tai
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (06) : 1366 - 1379
  • [28] On Eulerian semigroups of multivariate transformations and their cryptographic applications
    Ustimenko, Vasyl
    EUROPEAN JOURNAL OF MATHEMATICS, 2023, 9 (04)
  • [29] DME: A Full Encryption, Signature and KEM Multivariate Public Key Cryptosystem
    Luengo, Ignacio
    Avendano, Martin
    Coscojuela, Pilar
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 379 - 402
  • [30] A new public key scheme based on DRSA and generalized GDLP
    Goswami, Pinkimani
    Singh, Madan Mohan
    Bhuyan, Bubu
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2016, 8 (04)