A "medium-field" multivariate public-key encryption scheme

被引:0
|
作者
Wang, LC
Yang, BY [1 ]
Hu, YH
Lai, FP
机构
[1] Tamkang Univ, Dept Math, Tamsui, Taiwan
[2] Natl Donghua Univ, Dept Appl Math, Hualien, Taiwan
[3] Taiwan Informat Secur Ctr, Taipei, Taiwan
[4] Natl Taiwan Univ, Dept Comp Sci & Engn, Taipei 10764, Taiwan
关键词
multivariate (MQ) public key cryptosystem; Galois field; extended triangular form; tame-like map; tractable rational map; MFE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Electronic commerce fundamentally requires two different public-key cryptographical primitives, for key agreement and authentication. We present the new encryption scheme MFE, and provide a performance and security review. MFE belongs to the M Q class, an alternative class of PKCs also termed Polynomial-Based, or multivariate. They depend on multivariate quadratic systems being unsolvable. The classical trapdoors central to PKC's axe modular exponentiation for RSA and discrete logarithms for ElGamal/DSA/ECC. But they are relatively slow and will be obsoleted by the arrival of QC (Quantum Computers). The argument for MQ-schemes is that they axe usually faster, and there are no known QC-assisted attacks on them. There are several MQ digital signature schemes being investigated today. But encryption (or key exchange schemes) are another story in fact, only two other MQ-encryption schemes remain unbroken. They are both built along "big-field" lines. In contrast MFE uses medium-sized field extensions, which makes it faster. For security and efficiency, MFE employs an iteratively triangular decryption process which involves rational functions (called by some "tractable rational maps") and taking square roots. We discuss how MFE avoids previously known pitfalls of this genre while addressing its security concerns.
引用
收藏
页码:132 / 149
页数:18
相关论文
共 50 条
  • [31] Improvement in public-key encryption and key exchange scheme based on Chebyshev polynomials
    School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    不详
    不详
    Tiedao Xuebao, 2006, 5 (95-98):
  • [32] ZHFE, A New Multivariate Public Key Encryption Scheme
    Porras, Jaiberth
    Baena, John
    Ding, Jintai
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 229 - 245
  • [33] New Signcryption Scheme based on Multivariate Public-key Cryptosystem
    Han Yiliang
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONIC, INDUSTRIAL AND CONTROL ENGINEERING, 2015, 8 : 227 - 230
  • [34] Forward-secure Public-Key Encryption Scheme with Tamper Evidence
    Jiang Han
    Xu QiuLiang
    Hou MengBo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 656 - 659
  • [35] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137
  • [36] On some variations of Kurosawa-Desmedt public-key encryption scheme
    Phong, Le Trieu
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 226 - 230
  • [37] Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt
    Hulsing, Andreas
    Meijers, Matthias
    Strub, Pierre-Yves
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 622 - 653
  • [38] A LATTICE-BASED PUBLIC-KEY ENCRYPTION SCHEME FOR RFID APPLICATIONS
    Lin Hui
    Dong Yahui
    Liu Dongshen
    Liu Zilong
    Hou Dawei
    Tong Hengqin
    2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,
  • [39] Trapdoor security in a searchable public-key encryption scheme with a designated tester
    Rhee, Hyun Sook
    Park, Jong Hwan
    Susilo, Willy
    Lee, Dong Hoon
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) : 763 - 771
  • [40] Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
    Coron, JS
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 14 - 27