Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition

被引:5
|
作者
Liu Jinhui [1 ,2 ]
Zhang Huanguo [1 ,2 ]
Jia Jianwei [1 ,2 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Hubei, Peoples R China
[2] Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Post-quantum computational cryptography; Cryptanalysis; Polynomial symmetrical decomposition (PSD) problem; Computational complexity; ALGORITHM; GROBNER;
D O I
10.1049/cje.2017.05.005
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and ElGamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum algorithms have been found that are able to solve certain mathematical problems on non-commutative algebraic structures. Against this background, some novel public key cryptography based on Polynomial symmetrical decomposition (PSD) problem have been proposed. We find that these schemes are not secure. We present that they are vulnerable to structural attack, linearization equations attack, overdefined systems of multivariate polynomial equations attack and that, they only require polynomial time complexity to retrieve the same secret key for some given public keys respectively. We also propose an improvement to enhance public key cryptography based on PSD problem. In addition, we discuss possible lines of future work.
引用
收藏
页码:1139 / 1146
页数:8
相关论文
共 50 条
  • [1] Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition
    LIU Jinhui
    ZHANG Huanguo
    JIA Jianwei
    Chinese Journal of Electronics, 2017, 26 (06) : 1139 - 1146
  • [2] Cryptanalysis of Morillo-Obrador polynomial delegation schemes
    Xu, Shuaijianni
    Zhang, Liang Feng
    IET INFORMATION SECURITY, 2018, 12 (02) : 127 - 132
  • [3] Cryptanalysis of Schemes Based on Pseudoinverse Matrix
    LIU Jinhui
    ZHANG Huanguo
    JIA Jianwei
    Wuhan University Journal of Natural Sciences, 2016, 21 (03) : 209 - 213
  • [4] PACKING AND DECOMPOSITION PROBLEMS FOR POLYNOMIAL ASSOCIATION SCHEMES
    LEVENSHTEIN, VI
    EUROPEAN JOURNAL OF COMBINATORICS, 1993, 14 (05) : 461 - 477
  • [5] Cryptanalysis of Two Identity Based Signcryption Schemes
    Xia, Qi
    Xu, Chunxiang
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 292 - 294
  • [6] Cryptanalysis of Braid Groups based Authentication Schemes
    Ranjan, Pratik
    Om, Hari
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 432 - 436
  • [7] Cryptanalysis of block based spatial domain watermarking schemes
    Bas, TK
    PROGRESS IN CRYPTOLOGY -INDOCRYPT 2003, 2003, 2904 : 363 - 374
  • [8] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
  • [9] Cryptanalysis of secret sharing schemes based on spherical spaces
    Chervyakov, N. J.
    Babenko, M. G.
    Deryabin, M. A.
    Nazarov, A. S.
    2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), 2014, : 11 - 15
  • [10] Cryptanalysis of two sparse polynomial based public key cryptosystems
    Bao, F
    Deng, RH
    Geiselmann, W
    Schnorr, C
    Steinwandt, R
    Wu, HJ
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 153 - 164