New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem

被引:0
|
作者
Houzhen Wang [1 ,2 ]
Huanguo Zhang [1 ]
Shaowu Mao [1 ]
Wanqing Wu [1 ]
Liqiang Zhang [1 ]
机构
[1] Computer School of Wuhan University
基金
中国国家自然科学基金;
关键词
public key cryptosystem; key exchange; Multivariate Public Key Cryptography(MPKC); Morphism of Polynomials(MP) problem;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography(MPKC), which is considered to be an important candidate for post-quantum cryptography. However,it is universally regarded as a difficult task, as in the Knapsack cryptosystems, to design a secure MPKC scheme(especially an encryption scheme) employing the existing trapdoor construction. In this paper, we propose a new key-exchange scheme and an MPKC scheme based on the Morphism of Polynomials(MP) problem. The security of the proposed schemes is provably reducible to the conjectured intractability of a new difficult problem,namely the Decisional Multivariate Diffie-Hellman(DMDH) problem derived from the MP problem. The proposed key agreement is one of several non-number-theory-based protocols, and is a candidate for use in the post-quantum era. More importantly, by slightly modifying the protocol, we offer an original approach to designing a secure MPKC scheme. Furthermore, the proposed encryption scheme achieves a good tradeoff between security and efficiency,and seems competitive with traditional MPKC schemes.
引用
收藏
页码:302 / 311
页数:10
相关论文
共 50 条
  • [21] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    [J]. INFORMATION AND COMPUTATION, 1999, 151 (1-2) : 17 - 31
  • [22] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 219 - 233
  • [23] Equivalent key attack against a public-key cryptosystem based on subset sum problem
    Liu, Jiayang
    Bi, Jingguo
    [J]. IET INFORMATION SECURITY, 2018, 12 (06) : 498 - 501
  • [24] Public-key cryptosystem based on cellular automata
    Zhu, Bao-Ping
    Zhou, Liang
    Liu, Feng-Yu
    [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (05): : 612 - 616
  • [25] A Complete Public-Key Cryptosystem
    Grigoriev, Diva
    Hirsch, Edward A.
    Pervyshev, Konstantin
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (01) : 1 - 12
  • [26] On the security of a public-key cryptosystem
    Grosek, O
    Magliveras, SS
    Wei, W
    [J]. PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 71 - 75
  • [27] Quantum Public-Key Cryptosystem
    Ming-Xing Luo
    Xiu-Bo Chen
    Deng Yun
    Yi-Xian Yang
    [J]. International Journal of Theoretical Physics, 2012, 51 : 912 - 924
  • [28] MODIFICATION OF A PUBLIC-KEY CRYPTOSYSTEM
    OKAMOTO, T
    [J]. ELECTRONICS LETTERS, 1987, 23 (16) : 814 - 815
  • [29] ON THE MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    VANTILBURG, J
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 119 - 131
  • [30] Quantum Public-Key Cryptosystem
    Luo, Ming-Xing
    Chen, Xiu-Bo
    Yun, Deng
    Yang, Yi-Xian
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2012, 51 (03) : 912 - 924