Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials

被引:0
|
作者
Sakumoto, Koichi [1 ]
Shirai, Taizo [1 ]
Hiwatari, Harunaga [1 ]
机构
[1] Sony Corp, Shinagawa Ku, 5-1-12 Kitashinagawa, Tokyo 1410001, Japan
来源
关键词
identification scheme; zero knowledge; MQ problem; LATTICE PROBLEMS; FIAT-SHAMIR; CRYPTANALYSIS; SIGNATURES; EQUATIONS; SECURITY; ATTACKS; PROOFS; SFLASH; OIL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, is a promising problem in cryptography. A number of studies have been conducted on designing public-key schemes using the MQ problem, which are known as multivariate public-key cryptography (MPKC). However, the security of the existing schemes in MPKC relies not only on the MQ problem but also on an Isomorphism of Polynomials (IP) problem. In this paper, we propose public-key identification schemes based on the conjectured intractability of the MQ problem under the assumption of the existence of a non-interactive commitment scheme. Our schemes do not rely on the IP problem, and they consist of an identification protocol which is zero-knowledge argument of knowledge for the MQ problem. For a practical parameter choice, the efficiency of our schemes is highly comparable to that of identification schemes based on another problem including Permuted Kernels, Syndrome Decoding, Constrained Linear Equations, and Permuted Perceptrons. Furthermore, even if the protocol is repeated in parallel, our scheme can achieve the security under active attack with some additional cost.
引用
收藏
页码:706 / 723
页数:18
相关论文
共 50 条
  • [31] Efficient public-key authenticated deniable encryption schemes
    Cao, Yanmei
    Wei, Jianghong
    Zhang, Fangguo
    Xiang, Yang
    Chen, Xiaofeng
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [32] A new public-key cryptosystem based on the problem of reconstructing p-polynomials
    Faure, Cedric
    Loidreau, Pierre
    CODING AND CRYPTOGRAPHY, 2006, 3969 : 304 - 315
  • [33] Strong Knowledge Extractors for Public-Key Encryption Schemes
    Barbosa, Manuel
    Farshim, Pooya
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 164 - +
  • [34] Interactive identification protocol based on a quantum public-key cryptosystem
    Wu, Chenmiao
    Yang, Li
    QUANTUM AND NONLINEAR OPTICS III, 2014, 9269
  • [35] Security of Public-Key Cryptosystems Based on Chebyshev Polynomials Over Z/pkZ
    Yoshioka, Daisaburo
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (10) : 2204 - 2208
  • [36] Combined schemes for signature and encryption: The public-key and the identity-based setting
    Gonzalez Vasco, Maria Isabel
    Hess, Florian
    Steinwandt, Rainer
    INFORMATION AND COMPUTATION, 2016, 247 : 1 - 10
  • [37] A new public-key cryptosystem over a quadratic order with quadratic decryption time
    Paulus, S
    Takagi, T
    JOURNAL OF CRYPTOLOGY, 2000, 13 (02) : 263 - 272
  • [38] A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time
    Sachar Paulus
    Tsuyoshi Takagi
    Journal of Cryptology, 2000, 13 : 263 - 272
  • [39] Public key identification based on the equivalence of quadratic forms
    Hartung, Rupert J.
    Schnorr, Claus-Peter
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2007, PROCEEDINGS, 2007, 4708 : 333 - +
  • [40] On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field ZN
    Liao, Xiaofeng
    Chen, Fei
    Wong, Kwok-Wo
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (10) : 1392 - 1401