A Multivariate Public Key Cryptographic Scheme

被引:2
|
作者
Yuan Feng [1 ]
Sun Ying [1 ]
Jiang Jijun [1 ]
Zhao Shangwei [2 ]
Xu Shengwei [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Informat Secur Inst, Beijing 100070, Peoples R China
[2] Minzu Univ China, Coll Sci, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
public key cryptography; polynomials; multivariate; finite field; SQUARE;
D O I
10.1109/CC.2014.7019846
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic. The idea of embedding and layering is manifested in its construction. The security of the scheme is analyzed in detail, and this paper indicates that the scheme can withstand the up to date differential cryptanalysis. We give heuristic arguments to show that this scheme resists all known attacks.
引用
收藏
页码:120 / 124
页数:5
相关论文
共 50 条
  • [31] Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
    Wieschebrink, Christian
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 61 - 72
  • [32] A public key encryption scheme based on factoring and discrete logarithm
    Poulakis, Dimitrios
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2009, 12 (06) : 745 - 752
  • [33] New certificateless public key encryption scheme without pairing
    Yan, Xiaopeng
    Gong, Peng
    Bai, Zhiquan
    Wang, Jiantao
    Li, Ping
    IET INFORMATION SECURITY, 2013, 7 (04) : 271 - 276
  • [34] Security on public key encryption scheme based on ergodic matrices
    School of Computer Engineering, Jiangsu University of Technology, Changzhou
    Jiangsu
    213001, China
    不详
    Anhui
    230027, China
    不详
    Jiangsu
    210003, China
    Tien Tzu Hsueh Pao, 10 (2081-2085): : 2081 - 2085
  • [35] A new post-quantum multivariate polynomial public key encapsulation algorithm
    Randy Kuang
    Maria Perepechaenko
    Michel Barbeau
    Quantum Information Processing, 21
  • [36] A PUBLIC KEY MANAGEMENT SCHEME AND THRESHOLD-MULTISIGNATURE SCHEME FOR MOBILE AD HOC NETWORKS
    van der Merwe, J.
    Dawoud, D. S.
    McDonald, S.
    SAIEE AFRICA RESEARCH JOURNAL, 2006, 97 (01): : 82 - 92
  • [37] A new post-quantum multivariate polynomial public key encapsulation algorithm
    Kuang, Randy
    Perepechaenko, Maria
    Barbeau, Michel
    QUANTUM INFORMATION PROCESSING, 2022, 21 (10)
  • [38] Authenticated public key distribution scheme without trusted third party
    Koo, JH
    Kim, BH
    Lee, DH
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 926 - 935
  • [39] Multisignature scheme based on discrete logarithms in the plain public key model
    Shao, Zuhua
    Informatica (Ljubljana), 2010, 34 (04) : 509 - 515