Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition

被引:5
|
作者
Liu Jinhui [1 ,2 ]
Zhang Huanguo [1 ,2 ]
Jia Jianwei [1 ,2 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Hubei, Peoples R China
[2] Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Post-quantum computational cryptography; Cryptanalysis; Polynomial symmetrical decomposition (PSD) problem; Computational complexity; ALGORITHM; GROBNER;
D O I
10.1049/cje.2017.05.005
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and ElGamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum algorithms have been found that are able to solve certain mathematical problems on non-commutative algebraic structures. Against this background, some novel public key cryptography based on Polynomial symmetrical decomposition (PSD) problem have been proposed. We find that these schemes are not secure. We present that they are vulnerable to structural attack, linearization equations attack, overdefined systems of multivariate polynomial equations attack and that, they only require polynomial time complexity to retrieve the same secret key for some given public keys respectively. We also propose an improvement to enhance public key cryptography based on PSD problem. In addition, we discuss possible lines of future work.
引用
收藏
页码:1139 / 1146
页数:8
相关论文
共 50 条
  • [41] DECOMPOSITION CONSTRUCTION FOR SECRET SHARING SCHEMES WITH GRAPH ACCESS STRUCTURES IN POLYNOMIAL TIME
    Sun, Hung-Min
    Wang, Huaxiong
    Ku, Bying-He
    Pieprzyk, Josef
    SIAM JOURNAL ON DISCRETE MATHEMATICS, 2010, 24 (02) : 617 - 638
  • [42] Cryptanalysis of Two Ring Signcryption Schemes
    Wang, Huaqun
    Yu, Hong
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 41 - 46
  • [43] Cryptanalysis of Some Electronic Checkbook Schemes
    Sertkaya, Isa
    Kalkar, Oznur
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 603 - 612
  • [44] Cryptanalysis on Two Certificateless Signature Schemes
    Zhang, F.
    Li, S.
    Miao, S.
    Mu, Y.
    Susilo, W.
    Huang, X.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 586 - 591
  • [45] EXPRESSING A POLYNOMIAL AS THE CHARACTERISTIC POLYNOMIAL OF A SYMMETRICAL MATRIX
    FIEDLER, M
    LINEAR ALGEBRA AND ITS APPLICATIONS, 1990, 141 : 265 - 270
  • [46] Steps towards cryptanalysis of chaotic active/passive decomposition encryption schemes using average dynamics estimation
    Tenny, R
    Tsimring, LS
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2004, 14 (11): : 3949 - 3968
  • [47] Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
    Coron, JS
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 14 - 27
  • [48] Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
    Bouillaguet, Charles
    Faugere, Jean-Charles
    Fouque, Pierre-Alain
    Perret, Ludovic
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 473 - 493
  • [49] Cryptanalysis of a polynomial-based key management scheme for secure group communication
    Kamal, A.A. (a_kamala@ece.concordia.ca), 1600, Femto Technique Co., Ltd. (15):
  • [50] A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing
    Ghammam, Loubna
    Karabina, Koray
    Lacharme, Patrick
    Thiry-Atighehchi, Kevin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2869 - 2880