Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials

被引:0
|
作者
Sakumoto, Koichi [1 ]
Shirai, Taizo [1 ]
Hiwatari, Harunaga [1 ]
机构
[1] Sony Corp, Shinagawa Ku, 5-1-12 Kitashinagawa, Tokyo 1410001, Japan
来源
关键词
identification scheme; zero knowledge; MQ problem; LATTICE PROBLEMS; FIAT-SHAMIR; CRYPTANALYSIS; SIGNATURES; EQUATIONS; SECURITY; ATTACKS; PROOFS; SFLASH; OIL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, is a promising problem in cryptography. A number of studies have been conducted on designing public-key schemes using the MQ problem, which are known as multivariate public-key cryptography (MPKC). However, the security of the existing schemes in MPKC relies not only on the MQ problem but also on an Isomorphism of Polynomials (IP) problem. In this paper, we propose public-key identification schemes based on the conjectured intractability of the MQ problem under the assumption of the existence of a non-interactive commitment scheme. Our schemes do not rely on the IP problem, and they consist of an identification protocol which is zero-knowledge argument of knowledge for the MQ problem. For a practical parameter choice, the efficiency of our schemes is highly comparable to that of identification schemes based on another problem including Permuted Kernels, Syndrome Decoding, Constrained Linear Equations, and Permuted Perceptrons. Furthermore, even if the protocol is repeated in parallel, our scheme can achieve the security under active attack with some additional cost.
引用
收藏
页码:706 / 723
页数:18
相关论文
共 50 条
  • [41] A refined definition of semantic security for public-key encryption schemes
    Sakai, H
    Nakamura, N
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (01): : 34 - 39
  • [42] Security of Public-key Cryptosystems Based on Chebyshev Polynomials over Prime Finite Fields
    Lima, J. B.
    Campello de Souza, R. M.
    Panario, D.
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 1843 - +
  • [43] Selective opening security of practical public-key encryption schemes
    Heuer, Felix
    Jager, Tibor
    Schaege, Sven
    Kiltz, Eike
    IET INFORMATION SECURITY, 2016, 10 (06) : 304 - 318
  • [44] Efficient Public-Key Certificate Revocation Schemes for Smart Grid
    Mahmoud, Mohamed M. E. A.
    Misic, Jelena
    Shen, Xuemin
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 778 - 783
  • [45] Provably secure public-key encryption schemes: EPOC and PSEC
    Okamoto, Tatsuaki
    Fujisaki, Eiichiro
    Uchiyama, Shigenori
    NTT R and D, 1999, 48 (10): : 740 - 749
  • [46] On the Selective Opening Security of Practical Public-Key Encryption Schemes
    Heuer, Felix
    Jager, Tibor
    Kiltz, Eike
    Schaege, Sven
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 27 - 51
  • [47] Storage and computation optimization of public-key schemes on embedded devices
    Winderickx, Jori
    Braeken, An
    Mentens, Nele
    2018 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2018,
  • [48] BELL ALGORITHM SPEEDS DECRYPTION OF PUBLIC-KEY CODING SCHEMES
    HINDIN, HJ
    ELECTRONICS, 1981, 54 (16): : 39 - 40
  • [49] A "medium-field" multivariate public-key encryption scheme
    Wang, LC
    Yang, BY
    Hu, YH
    Lai, FP
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 132 - 149
  • [50] Relations among notions of security for public-key encryption schemes
    Bellare, M
    Desai, A
    Pointcheval, D
    Rogaway, P
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 26 - 45