On the Equivalent Keys in Multivariate Cryptosystems

被引:0
|
作者
刘明洁 [1 ]
韩立东 [1 ]
王小云 [1 ]
机构
[1] Institute for Advanced Study,Tsinghua University
关键词
multivariate cryptosystem; equivalent keys; hidden field equation (HFE); modified techniques;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The number of equivalent keys in multivariate cryptosystem is closely related to the scheme security. This study analyzes the structure of the private key space in some multivariate schemes.The result gives the lower bounds on the number of equivalent keys of some variants of the hidden field equation (HFE) scheme including plus, minus-plus, embedding, and internal perturbation. This method estimates the number of invertible transformations which maintain the form of the central map invariant. Furthermore,a formal proof shows that the two modifications of fixing and embedding are equivalent in security analyses of multivariate schemes. Also this paper corrects previous proofs in Wolf’s work on the number of equivalent keys in HFEv,the unbalanced oil and vinegar (UOV) scheme, and the stepwise triangular systems (STS).
引用
收藏
页码:225 / 232
页数:8
相关论文
共 50 条
  • [21] General Fault Attacks on Multivariate Public Key Cryptosystems
    Hashimoto, Yasufumi
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 196 - 205
  • [22] Multivariate public key cryptosystems from diophantine equations
    Gao, Shuhong
    Heindl, Raymond
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 67 (01) : 1 - 18
  • [23] Extended multivariate public key cryptosystems with secure encryption function
    WANG HouZhen 1
    2 State Key Laboratory of Software Engineering
    ScienceChina(InformationSciences), 2011, 54 (06) : 1161 - 1171
  • [24] A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems
    Perlner, Ray
    Smith-Tone, Daniel
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 165 - 173
  • [25] Extended multivariate public key cryptosystems with secure encryption function
    HouZhen Wang
    HuanGuo Zhang
    ZhangYi Wang
    Ming Tang
    Science China Information Sciences, 2011, 54
  • [26] Ring signature scheme based on multivariate public key cryptosystems
    Wang, Shangping
    Ma, Rui
    Zhang, Yaling
    Wang, Xiaofeng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 62 (10) : 3973 - 3979
  • [27] Extended multivariate public key cryptosystems with secure encryption function
    Wang HouZhen
    Zhang HuanGuo
    Wang ZhangYi
    Tang Ming
    SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (06) : 1161 - 1171
  • [28] Classes of weak Dembowski-Ostrom polynomials for multivariate quadratic cryptosystems
    Alam, Bilal
    Ozbudak, Ferruh
    Yayla, Oguz
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (01) : 11 - 22
  • [29] Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems
    Chen, Jiahui
    Ling, Jie
    Ning, Jianting
    Ding, Jintai
    COMPUTER JOURNAL, 2019, 62 (08): : 1132 - 1147
  • [30] Large superfluous keys in multivariate quadratic asymmetric systems
    Wolf, C
    Preneel, B
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 275 - 287