A Multivariate Public Key Cryptographic Scheme

被引:2
|
作者
Yuan Feng [1 ]
Sun Ying [1 ]
Jiang Jijun [1 ]
Zhao Shangwei [2 ]
Xu Shengwei [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Informat Secur Inst, Beijing 100070, Peoples R China
[2] Minzu Univ China, Coll Sci, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
public key cryptography; polynomials; multivariate; finite field; SQUARE;
D O I
10.1109/CC.2014.7019846
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic. The idea of embedding and layering is manifested in its construction. The security of the scheme is analyzed in detail, and this paper indicates that the scheme can withstand the up to date differential cryptanalysis. We give heuristic arguments to show that this scheme resists all known attacks.
引用
收藏
页码:120 / 124
页数:5
相关论文
共 50 条
  • [41] An attack on a group-based cryptographic scheme
    Hofheinz, Dennis
    Unruh, Dominique
    ALGEBRAIC METHODS IN CRYPTOGRAPHY, 2006, 418 : 133 - +
  • [42] Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm
    Kuang, Randy
    Perepechaenko, Maria
    Toth, Ryan
    Barbeau, Michel
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01):
  • [43] Building Secure Public Key Encryption Scheme from Hidden Field Equations
    Ping, Yuan y
    Wang, Baocang
    Yang, Yuehua
    Tian, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [44] An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy
    Shamshad, Shuhab
    Riaz, Farina
    Riaz, Rabia
    Rizvi, Sanam Shahla
    Abdulla, Shahab
    SENSORS, 2022, 22 (21)
  • [45] A Public-key Cryptography and A Entity Authentication Scheme Based on Improved Hyperbolic Function
    Wang, Dahu
    Bai, Heyuan
    Liu, Qunpo
    Tong, Zhaojing
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 530 - 533
  • [46] A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations
    Akiyama, Koichiro
    Goto, Yasuhiro
    Okumura, Shinya
    Takagi, Tsuyoshi
    Nuida, Koji
    Hanaoka, Goichiro
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 215 - 234
  • [47] A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks
    Chuang, Po-Jen
    Chang, Shao-Hsuan
    Lin, Chih-Shin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (05) : 1859 - 1873
  • [48] An Algorithm Based Fault Tolerant Scheme for Elliptic Curve Public-key Cryptography
    Zhang, Chang N.
    Liu, Xiao Wei
    DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY, 2009, : 28 - 33
  • [49] Fast Three-Input Multipliers over Small Composite Fields for Multivariate Public Key Cryptography
    Yi, Haibo
    Li, Weijian
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 165 - 178
  • [50] Public key digital contents confidentiality scheme based on quantum spin and finite state automation
    Batool, Syeda Iram
    Amin, Muhammad
    Waseem, Hafiz Muhammad
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 537