Extended multivariate public key cryptosystems with secure encryption function

被引:0
作者
HouZhen Wang
HuanGuo Zhang
ZhangYi Wang
Ming Tang
机构
[1] Wuhan University,The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Computer
[2] Wuhan University,State Key Laboratory of Software Engineering
来源
Science China Information Sciences | 2011年 / 54卷
关键词
cryptography; post-quantum cryptography; MQ problem; hash function;
D O I
暂无
中图分类号
学科分类号
摘要
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational power, multivariate public key cryptosystems (MPKCs) have attracted increasing attention in recently years. Unfortunately, the existing MPKCs can only be used as a multivariate signature scheme, and it remains unknown how to construct an efficient MPKC enabling secure encryption. Furthermore, some multivariate signature schemes have been shown insecure in recent years, and it is also not trivial to build MPKC which can serve as a secure signature scheme. By employing the basic MQ-trapdoors, this paper proposes a novel MPKC and shows how it can be used as a multivariate signature scheme and a multivariate encryption scheme, respectively. The goal is achieved by incorporating our new hash authentication techniques and some modification methods such as the Shamir’s minus method. Thorough analysis shows that our schemes are secure and efficient. Our MPKC gives a positive response to the challenges in multivariate public key cryptography.
引用
收藏
相关论文
共 50 条
  • [41] Public-Key Encryption with Lazy Parties
    Yasunaga, Kenji
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (02) : 590 - 600
  • [42] Evolution of the McEliece Public Key Encryption Scheme
    Bucerzan, Dominic
    Dragoi, Vlad
    Kalachi, Herve Tale
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 129 - 149
  • [43] Probabilistic Public Key Encryption with Equality Test
    Yang, Guomin
    Tan, Chik How
    Huang, Qiong
    Wong, Duncan S.
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 119 - +
  • [44] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    [J]. CRYPTOGRAPHY, 2023, 7 (04)
  • [45] Will quantum computers be the end of public key encryption?
    [J]. Woodward, Alan (alan.woodward@surrey.ac.uk), 1600, Taylor and Francis Ltd. (01): : 1 - 22
  • [46] Analyze encryption and public key infrastructure (PKI)
    Lozupone, Vincent
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2018, 38 (01) : 42 - 44
  • [47] Updatable Public Key Encryption in the Standard Model
    Dodis, Yevgeniy
    Karthikeyan, Harish
    Wichs, Daniel
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT III, 2021, 13044 : 254 - 285
  • [48] A Lightweight Image Encryption Algorithm Based on Secure Key Generation
    Ali, A'Laa Hussein
    Gbashi, Ekhlas Khalaf
    Alaskar, Haya
    Hussain, Abir Jaafar
    [J]. IEEE ACCESS, 2024, 12 : 95871 - 95883
  • [49] An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key
    Zaher, Ashraf A.
    [J]. CHAOS SOLITONS & FRACTALS, 2009, 42 (05) : 2804 - 2814
  • [50] Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
    Fujisaki, Eiichiro
    Xagawa, Keita
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 908 - 938