Extended multivariate public key cryptosystems with secure encryption function

被引:0
作者
HouZhen Wang
HuanGuo Zhang
ZhangYi Wang
Ming Tang
机构
[1] Wuhan University,The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Computer
[2] Wuhan University,State Key Laboratory of Software Engineering
来源
Science China Information Sciences | 2011年 / 54卷
关键词
cryptography; post-quantum cryptography; MQ problem; hash function;
D O I
暂无
中图分类号
学科分类号
摘要
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational power, multivariate public key cryptosystems (MPKCs) have attracted increasing attention in recently years. Unfortunately, the existing MPKCs can only be used as a multivariate signature scheme, and it remains unknown how to construct an efficient MPKC enabling secure encryption. Furthermore, some multivariate signature schemes have been shown insecure in recent years, and it is also not trivial to build MPKC which can serve as a secure signature scheme. By employing the basic MQ-trapdoors, this paper proposes a novel MPKC and shows how it can be used as a multivariate signature scheme and a multivariate encryption scheme, respectively. The goal is achieved by incorporating our new hash authentication techniques and some modification methods such as the Shamir’s minus method. Thorough analysis shows that our schemes are secure and efficient. Our MPKC gives a positive response to the challenges in multivariate public key cryptography.
引用
收藏
相关论文
共 50 条
  • [31] Quantum public key encryption scheme with four states key
    Liu, Zhixin
    Xie, Qiaoling
    Zha, Yongfu
    Dong, Yumin
    PHYSICA SCRIPTA, 2022, 97 (04)
  • [32] On the security of biquadratic C public-key cryptosystems and its generalizations
    Felke, Patrick
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (03): : 427 - 442
  • [33] On the security of biquadratic C∗ public-key cryptosystems and its generalizations
    Patrick Felke
    Cryptography and Communications, 2019, 11 : 427 - 442
  • [34] Design and Analysis of Secure One-way Functions for the Protection of Symmetric Key Cryptosystems
    Chhabra, Surbhi
    Dhanwani, Vishakha
    Dhaka, Vikas Kumar
    Lata, Kusum
    2020 24TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2020,
  • [35] Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud
    Wang, Zhiwei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 770 - 776
  • [36] Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    Cramer, R
    Shoup, V
    SIAM JOURNAL ON COMPUTING, 2003, 33 (01) : 167 - 226
  • [37] Fast modular multiplication and parallel algorithms in public-key cryptosystems
    Luo, P
    Dai, YQ
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES A-MATHEMATICAL ANALYSIS, 2004, 11 (5-6): : 675 - 689
  • [38] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42
  • [39] Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications
    Faonio, Antonio
    Fiore, Dario
    Herranz, Javier
    Rafols, Carla
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 159 - 190
  • [40] Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
    Qin, Baodong
    Liu, Shengli
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 19 - 36