Public-Key Cryptography from New Multivariate Quadratic Assumptions

被引:0
|
作者
Huang, Yun-Ju [1 ,3 ]
Liu, Feng-Hao [2 ]
Yang, Bo-Yin [3 ]
机构
[1] Kyushu Univ, Fac Math, Fukuoka, Japan
[2] Brown Univ, Comp Sci, Providence, RI 02912 USA
[3] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
来源
基金
美国国家科学基金会;
关键词
PSEUDORANDOM GENERATORS; OVERDEFINED SYSTEMS; CRYPTANALYSIS; EFFICIENT; XL; CRYPTOSYSTEMS; SCHEMES; SFLASH;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryptions. In particular, we research in the following two directions: - We establish a precise asymptotic formulation of a family of hard MQ problems, and provide empirical evidence to confirm the hardness. - We construct public-key encryption schemes, and prove their security under the hardness assumption of this family. Also, we provide a new perspective to look at MQ systems that plays a key role to our design and proof of security. As a consequence, we construct the first public-key encryption scheme that is provably secure under the MQ assumption. Moreover, our public-key encryption scheme is efficient in the sense that it only needs a ciphertext length L + poly(k) to encrypt a message M is an element of {0, 1}(L) for any un-prespecified polynomial L, where k is the security parameter. This is essentially optimal since an additive overhead is the best we can hope for.
引用
收藏
页码:190 / 205
页数:16
相关论文
共 50 条
  • [1] Public-Key Cryptography from Different Assumptions
    Applebaum, Benny
    Barak, Boaz
    Wigderson, Avi
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 171 - 180
  • [2] Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
    Albrecht, Martin R.
    Faugere, Jean-Charles
    Fitzpatrick, Robert
    Perret, Ludovic
    Todo, Yosuke
    Xagawa, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 446 - 464
  • [3] Public-key Cryptography from Different Assumptions A Multi-bit Version
    Chabanne, Herve
    Cohen, Gerard
    Patey, Alain
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 561 - 567
  • [4] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [5] Recent progress in the security evaluation of multivariate public-key cryptography
    Ikematsu, Yasuhiko
    Nakamura, Shuhei
    Takagi, Tsuyoshi
    IET INFORMATION SECURITY, 2023, 17 (02) : 210 - 226
  • [6] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2
  • [7] PUBLIC-KEY CRYPTOGRAPHY - FROM THEORY TO STANDARD
    TEREKHOV, AN
    TISKIN, AV
    PROGRAMMING AND COMPUTER SOFTWARE, 1994, 20 (05) : 189 - 192
  • [8] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &
  • [9] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232
  • [10] UNTANGLING PUBLIC-KEY - CRYPTOGRAPHY
    SCHNEIER, B
    DR DOBBS JOURNAL, 1992, 17 (05): : 16 - &