Public-Key Cryptography from New Multivariate Quadratic Assumptions

被引:0
|
作者
Huang, Yun-Ju [1 ,3 ]
Liu, Feng-Hao [2 ]
Yang, Bo-Yin [3 ]
机构
[1] Kyushu Univ, Fac Math, Fukuoka, Japan
[2] Brown Univ, Comp Sci, Providence, RI 02912 USA
[3] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
来源
基金
美国国家科学基金会;
关键词
PSEUDORANDOM GENERATORS; OVERDEFINED SYSTEMS; CRYPTANALYSIS; EFFICIENT; XL; CRYPTOSYSTEMS; SCHEMES; SFLASH;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryptions. In particular, we research in the following two directions: - We establish a precise asymptotic formulation of a family of hard MQ problems, and provide empirical evidence to confirm the hardness. - We construct public-key encryption schemes, and prove their security under the hardness assumption of this family. Also, we provide a new perspective to look at MQ systems that plays a key role to our design and proof of security. As a consequence, we construct the first public-key encryption scheme that is provably secure under the MQ assumption. Moreover, our public-key encryption scheme is efficient in the sense that it only needs a ciphertext length L + poly(k) to encrypt a message M is an element of {0, 1}(L) for any un-prespecified polynomial L, where k is the security parameter. This is essentially optimal since an additive overhead is the best we can hope for.
引用
收藏
页码:190 / 205
页数:16
相关论文
共 50 条
  • [41] RFID privacy based on public-key cryptography
    Vaudenay, Serge
    Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 1 - 6
  • [42] An-algebraic method for public-key cryptography
    Anshel, I
    Anshel, M
    Goldfeld, D
    MATHEMATICAL RESEARCH LETTERS, 1999, 6 (3-4) : 287 - 291
  • [43] Inverse matrices with applications in public-key cryptography
    Makoui, Farshid Haidary
    Gulliver, Thomas Aaron
    JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2024, 18
  • [44] SECRET-HARDWARE PUBLIC-KEY CRYPTOGRAPHY
    KAK, SC
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1986, 133 (02): : 94 - 96
  • [45] PUBLIC-KEY CRYPTOGRAPHY AND OPEN SYSTEMS INTERCONNECTION
    FORD, W
    OHIGGINS, B
    IEEE COMMUNICATIONS MAGAZINE, 1992, 30 (07) : 30 - 35
  • [46] Information Security, Mathematics, and Public-Key Cryptography
    Simon Blake-Wilson
    Designs, Codes and Cryptography, 2000, 19 : 77 - 99
  • [47] Secure fingerprinting using public-key cryptography
    Yoshiura, H
    Sasaki, R
    Takaragi, K
    SECURITY PROTOCOLS, 1999, 1550 : 83 - 94
  • [48] PASSWORD AUTHENTICATION USING PUBLIC-KEY CRYPTOGRAPHY
    HARN, L
    HUANG, D
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1989, 18 (12) : 1001 - 1017
  • [49] Method for realization of transformations in public-key cryptography
    P. Vasylenko Kharkiv National Technical University of Agriculture
    Telecommun Radio Eng, 2007, 17 (1559-1572):
  • [50] A group theoretic approach to public-key cryptography
    Anshel, I
    Anshel, M
    Fisher, B
    Goldfeld, D
    UNUSUAL APPLICATIONS OF NUMBER THEORY, 2004, 64 : 17 - 23