Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition

被引:5
|
作者
Liu Jinhui [1 ,2 ]
Zhang Huanguo [1 ,2 ]
Jia Jianwei [1 ,2 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Hubei, Peoples R China
[2] Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Post-quantum computational cryptography; Cryptanalysis; Polynomial symmetrical decomposition (PSD) problem; Computational complexity; ALGORITHM; GROBNER;
D O I
10.1049/cje.2017.05.005
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and ElGamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum algorithms have been found that are able to solve certain mathematical problems on non-commutative algebraic structures. Against this background, some novel public key cryptography based on Polynomial symmetrical decomposition (PSD) problem have been proposed. We find that these schemes are not secure. We present that they are vulnerable to structural attack, linearization equations attack, overdefined systems of multivariate polynomial equations attack and that, they only require polynomial time complexity to retrieve the same secret key for some given public keys respectively. We also propose an improvement to enhance public key cryptography based on PSD problem. In addition, we discuss possible lines of future work.
引用
收藏
页码:1139 / 1146
页数:8
相关论文
共 50 条
  • [21] Differential cryptanalysis for multivariate schemes
    Fouque, PA
    Granboulan, L
    Stern, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 341 - 353
  • [22] Cryptanalysis of two pairing-based blind signature schemes
    Wang, Jiyao
    Cao, Tianjie
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 180 - +
  • [23] Cryptanalysis of Two EPC-based RFID Security Schemes
    Abdolmaleki, Behzad
    Baghery, Karim
    Akhbari, Bahareh
    Aref, Mohammad Reza
    2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 116 - 121
  • [24] Cryptanalysis of two ECDLP-based proxy signature schemes
    School of Computer Science and Technology, Nanhu Campus, China University of Mining and Technology, Xuzhou 221116, China
    J. Comput. Inf. Syst., 2008, 5 (2161-2165):
  • [25] Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes
    Tseng, Yi-Fan
    Huang, Jheng-Jia
    Yang, Hao-Yu
    Chien, Tsung-Yu
    Wu, Chieh-Han
    2022 17TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS, 2022, : 24 - 28
  • [26] Cryptanalysis and improvements on some graph-based authentication schemes
    Abdullah, Herish O.
    Eftekhari, Mohammad
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2013, 16 (4-5): : 297 - 306
  • [27] Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD Problem
    Sanyashi, Tikaram
    Desai, Darshil
    Menezes, Bernard
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 517 - 522
  • [28] Coarray Synthesis Based on Polynomial Decomposition
    Martin, Carlos J.
    Martinez-Graullera, Oscar
    Godoy, Gregorio
    Ullate, Luis G.
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2010, 19 (04) : 1102 - 1107
  • [29] Cryptanalysis of Rank-Metric Schemes Based on Distorted Gabidulin Codes
    Briaud, Pierre
    Loidreau, Pierre
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 38 - 56
  • [30] Cryptanalysis of two similar chaos-based image encryption schemes
    Mastan, J. Mohamedmoideen Kader
    Pandian, R.
    CRYPTOLOGIA, 2021, 45 (06) : 541 - 552