On the Equivalent Keys in Multivariate Cryptosystems

被引:0
|
作者
刘明洁 [1 ]
韩立东 [1 ]
王小云 [1 ]
机构
[1] Institute for Advanced Study,Tsinghua University
关键词
multivariate cryptosystem; equivalent keys; hidden field equation (HFE); modified techniques;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The number of equivalent keys in multivariate cryptosystem is closely related to the scheme security. This study analyzes the structure of the private key space in some multivariate schemes.The result gives the lower bounds on the number of equivalent keys of some variants of the hidden field equation (HFE) scheme including plus, minus-plus, embedding, and internal perturbation. This method estimates the number of invertible transformations which maintain the form of the central map invariant. Furthermore,a formal proof shows that the two modifications of fixing and embedding are equivalent in security analyses of multivariate schemes. Also this paper corrects previous proofs in Wolf’s work on the number of equivalent keys in HFEv,the unbalanced oil and vinegar (UOV) scheme, and the stepwise triangular systems (STS).
引用
收藏
页码:225 / 232
页数:8
相关论文
共 50 条
  • [1] Similar keys of multivariate quadratic public key cryptosystems
    Hu, YH
    Wang, LC
    Chou, CY
    Lai, FP
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 211 - 222
  • [2] On the equivalent keys of multivariate public key cryptography
    Yuan, Feng
    Hu, Yu-Pu
    Ou, Hai-Wen
    Li, Shun-Bo
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2010, 33 (03): : 97 - 101
  • [3] Equivalent keys in Multivariate Quadratic public key systems
    Wolf, Christopher
    Preneel, Bart
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (04) : 375 - 415
  • [4] Equivalent keys of multivariate quadratic public key cryptosystem
    Wang, Xin
    Sun, Chen
    Wang, Xin-Mei
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2009, 36 (03): : 428 - 432
  • [5] Equivalent keys of medium field multivariate public key encryption scheme
    Wang, Xin
    Sun, Chen
    Wang, Xinmei
    Journal of Computational Information Systems, 2009, 5 (05): : 1403 - 1408
  • [6] Authenticity of public keys in asymmetric cryptosystems
    Lee, WB
    Chang, CC
    COMPUTER COMMUNICATIONS, 1998, 21 (02) : 195 - 198
  • [7] Parallel computation of the generating keys for RSA cryptosystems
    Chang, CC
    Hwang, MS
    ELECTRONICS LETTERS, 1996, 32 (15) : 1365 - 1366
  • [8] Fast generating method for keys of RSA cryptosystems
    Shi, Ronghua
    Hu, Xiangling
    Dianzi Keji Daxue Xuebao/Journal of University of Electronic Science and Technology of China, 1999, 28 (05): : 461 - 463
  • [9] Equivalent keys of HPC
    D'Halluin, C
    Bijnens, G
    Preneel, B
    Rijmen, V
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 29 - 42
  • [10] A new paradigm for group cryptosystems using quick keys
    Saxena, A
    Soh, B
    ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 385 - 389