Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials

被引:0
|
作者
Sakumoto, Koichi [1 ]
Shirai, Taizo [1 ]
Hiwatari, Harunaga [1 ]
机构
[1] Sony Corp, Shinagawa Ku, 5-1-12 Kitashinagawa, Tokyo 1410001, Japan
来源
关键词
identification scheme; zero knowledge; MQ problem; LATTICE PROBLEMS; FIAT-SHAMIR; CRYPTANALYSIS; SIGNATURES; EQUATIONS; SECURITY; ATTACKS; PROOFS; SFLASH; OIL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, is a promising problem in cryptography. A number of studies have been conducted on designing public-key schemes using the MQ problem, which are known as multivariate public-key cryptography (MPKC). However, the security of the existing schemes in MPKC relies not only on the MQ problem but also on an Isomorphism of Polynomials (IP) problem. In this paper, we propose public-key identification schemes based on the conjectured intractability of the MQ problem under the assumption of the existence of a non-interactive commitment scheme. Our schemes do not rely on the IP problem, and they consist of an identification protocol which is zero-knowledge argument of knowledge for the MQ problem. For a practical parameter choice, the efficiency of our schemes is highly comparable to that of identification schemes based on another problem including Permuted Kernels, Syndrome Decoding, Constrained Linear Equations, and Permuted Perceptrons. Furthermore, even if the protocol is repeated in parallel, our scheme can achieve the security under active attack with some additional cost.
引用
收藏
页码:706 / 723
页数:18
相关论文
共 50 条
  • [21] Security analysis of public-key watermarking schemes
    Craver, S
    Katzenbeisser, S
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 172 - 182
  • [22] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
  • [23] A research on new public-key encryption schemes
    Jiang, ZT
    Xiang, MS
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 51 - 61
  • [24] CRYPTANALYSIS OF PUBLIC-KEY DISTRIBUTION-SYSTEMS BASED ON DICKSON POLYNOMIALS
    LI, DX
    ELECTRONICS LETTERS, 1991, 27 (03) : 228 - 229
  • [25] Public-key encryption based on Chebyshev polynomials over GF(q)
    Lima, J. B.
    Panario, D.
    Campello de Souza, R. M.
    INFORMATION PROCESSING LETTERS, 2010, 111 (02) : 51 - 56
  • [26] Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes
    Wang Houzhen
    Shen Changxiang
    Xu Zhengquan
    Zhang Huanguo
    CHINA COMMUNICATIONS, 2011, 8 (04) : 23 - 31
  • [27] Key recovery on several matrix public-key encryption schemes
    Wang, Houzhen
    Zhang, Huanguo
    Tang, Shaohua
    IET INFORMATION SECURITY, 2016, 10 (03) : 152 - 155
  • [28] Building Key-Private Public-Key Encryption Schemes
    Paterson, Kenneth G.
    Srinivasan, Sriramkrishnan
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 276 - 292
  • [29] A New Public Key Signature Scheme based on Quadratic Polynomials
    Yuan, Feng
    Zhao, Shangwei
    Ou, Haiwen
    Xu, Shengwei
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 8 - 11
  • [30] Cryptanalysis of a quadratic compact knapsack public-key cryptosystem
    Lee, Moon Sung
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 62 (09) : 3614 - 3621