Public-Key Cryptography from New Multivariate Quadratic Assumptions

被引:0
|
作者
Huang, Yun-Ju [1 ,3 ]
Liu, Feng-Hao [2 ]
Yang, Bo-Yin [3 ]
机构
[1] Kyushu Univ, Fac Math, Fukuoka, Japan
[2] Brown Univ, Comp Sci, Providence, RI 02912 USA
[3] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
来源
基金
美国国家科学基金会;
关键词
PSEUDORANDOM GENERATORS; OVERDEFINED SYSTEMS; CRYPTANALYSIS; EFFICIENT; XL; CRYPTOSYSTEMS; SCHEMES; SFLASH;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryptions. In particular, we research in the following two directions: - We establish a precise asymptotic formulation of a family of hard MQ problems, and provide empirical evidence to confirm the hardness. - We construct public-key encryption schemes, and prove their security under the hardness assumption of this family. Also, we provide a new perspective to look at MQ systems that plays a key role to our design and proof of security. As a consequence, we construct the first public-key encryption scheme that is provably secure under the MQ assumption. Moreover, our public-key encryption scheme is efficient in the sense that it only needs a ciphertext length L + poly(k) to encrypt a message M is an element of {0, 1}(L) for any un-prespecified polynomial L, where k is the security parameter. This is essentially optimal since an additive overhead is the best we can hope for.
引用
收藏
页码:190 / 205
页数:16
相关论文
共 50 条
  • [31] Probability theory and public-key cryptography
    Bessonov, Mariya
    Grigoriev, Dima
    Shpilrain, Vladimir
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 285 - 290
  • [32] Public-key cryptography on smart cards
    Fuchsberger, A
    Gollmann, D
    Lothian, P
    Paterson, KG
    Sidiropoulos, A
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 250 - 269
  • [33] Hierarchical key assignment without public-key cryptography
    Lin, CH
    COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619
  • [34] Efficient Public-Key Cryptography in the Presence of Key Leakage
    Dodis, Yevgeniy
    Haralambiev, Kristiyan
    Lopez-Alt, Adriana
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 613 - 631
  • [35] Generalized public-key cryptography with tight security
    Wu, Ge
    Guo, Fuchun
    Susilo, Willy
    INFORMATION SCIENCES, 2019, 504 : 561 - 577
  • [36] A novel unified architecture for public-key cryptography
    Cilardo, A
    Mazzeo, A
    Mazzocca, N
    Romano, L
    DESIGNERS' FORUM: DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, 2005, : 52 - 57
  • [37] Public-key cryptography for RFID-tags
    Batina, L.
    Guajardo, J.
    Kerins, T.
    Mentens, N.
    Tuyls, P.
    Verbauwhede, I.
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 217 - +
  • [38] The Magic of Elliptic Curves and Public-Key Cryptography
    Florian Heß
    Andreas Stein
    Sandra Stein
    Manfred Lochter
    Jahresbericht der Deutschen Mathematiker-Vereinigung, 2012, 114 (2) : 59 - 88
  • [39] Information security, mathematics, and public-key cryptography
    Blake-Wilson, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 77 - 99
  • [40] Computational Thinking Enrichment: Public-Key Cryptography
    Rosamond, Frances
    INFORMATICS IN EDUCATION, 2018, 17 (01): : 93 - 103