A Multivariate Public Key Cryptographic Scheme

被引:2
|
作者
Yuan Feng [1 ]
Sun Ying [1 ]
Jiang Jijun [1 ]
Zhao Shangwei [2 ]
Xu Shengwei [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Informat Secur Inst, Beijing 100070, Peoples R China
[2] Minzu Univ China, Coll Sci, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
public key cryptography; polynomials; multivariate; finite field; SQUARE;
D O I
10.1109/CC.2014.7019846
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic. The idea of embedding and layering is manifested in its construction. The security of the scheme is analyzed in detail, and this paper indicates that the scheme can withstand the up to date differential cryptanalysis. We give heuristic arguments to show that this scheme resists all known attacks.
引用
收藏
页码:120 / 124
页数:5
相关论文
共 50 条
  • [31] A unified architecture for a public key cryptographic coprocessor
    Wang, Yi
    Maskell, Douglas L.
    Leiwo, Jussipekka
    JOURNAL OF SYSTEMS ARCHITECTURE, 2008, 54 (10) : 1004 - 1016
  • [32] VEHICULAR IMPLEMENTATIONS OF PUBLIC KEY CRYPTOGRAPHIC TECHNIQUES
    ARAZI, B
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 1991, 40 (03) : 646 - 653
  • [33] Watermarking Public-Key Cryptographic Primitives
    Goyal, Rishab
    Kim, Sam
    Manohar, Nathan
    Waters, Brent
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 367 - 398
  • [34] Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
    Chen, TS
    Huang, KH
    Chung, YF
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 567 - 570
  • [35] Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
    Chen, TS
    Huang, KH
    Chung, YF
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 159 (01) : 147 - 155
  • [36] Cryptographic Key Generation Scheme from Cancellable Biometrics
    Sarkar, Arpita
    Singh, Binod Kr
    Bhaumik, Ujjayanta
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 265 - 272
  • [37] Correctness of CHW cryptographic key assignment scheme in a hierarchy
    Tan, KJ
    Gu, SJ
    Zhu, HW
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (04): : 217 - 218
  • [38] Extension of CHW cryptographic key assignment scheme in a hierarchy
    Hwang, MS
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (04): : 219 - 219
  • [39] A Novel Cryptographic Key Exchange Scheme using Resistors
    Lin, Pey-Chang Kent
    Ivanov, Alex
    Johnson, Bradley
    Khatri, Sunil P.
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 451 - 452
  • [40] A cryptographic key assignment scheme in a hierarchy for access control
    Hwang, MS
    MATHEMATICAL AND COMPUTER MODELLING, 1997, 26 (02) : 27 - 31