A Multivariate Public Key Cryptographic Scheme

被引:2
|
作者
Yuan Feng [1 ]
Sun Ying [1 ]
Jiang Jijun [1 ]
Zhao Shangwei [2 ]
Xu Shengwei [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Informat Secur Inst, Beijing 100070, Peoples R China
[2] Minzu Univ China, Coll Sci, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
public key cryptography; polynomials; multivariate; finite field; SQUARE;
D O I
10.1109/CC.2014.7019846
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic. The idea of embedding and layering is manifested in its construction. The security of the scheme is analyzed in detail, and this paper indicates that the scheme can withstand the up to date differential cryptanalysis. We give heuristic arguments to show that this scheme resists all known attacks.
引用
收藏
页码:120 / 124
页数:5
相关论文
共 50 条
  • [41] A DYNAMIC CRYPTOGRAPHIC KEY ASSIGNMENT SCHEME IN A TREE STRUCTURE
    LIAW, HT
    WANG, SJ
    LEI, CL
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 25 (06) : 109 - 114
  • [42] Cryptographic key assignment scheme for hierarchical access control
    Wu, TC
    Chang, CC
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2001, 16 (01): : 25 - 28
  • [43] An improvement of cryptographic key assignment scheme in a user hierarchy
    Chen, TS
    Huang, GS
    Tasi, CC
    Chang, NT
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 133 - 136
  • [44] A new construction of multivariate public key encryption scheme through internally perturbed plus
    Wang, Zhiwei
    Nie, Xuyun
    Zheng, Shihui
    Yang, Yixian
    Zhang, Zhihui
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 1 - +
  • [45] Certificateless public key encryption with cryptographic reverse firewalls
    Zhou, Yuyang
    Guo, Jing
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 109
  • [46] ID-BASED PUBLIC KEY CRYPTOGRAPHIC SYSTEMS
    Cheremushkin, A. V.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2023, (61): : 44 - 85
  • [47] Quantum walk public-key cryptographic system
    Vlachou, C.
    Rodrigues, J.
    Mateus, P.
    Paunkovic, N.
    Souto, A.
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2015, 13 (07)
  • [48] A PUBLIC-KEY EXTENSION TO THE COMMON CRYPTOGRAPHIC ARCHITECTURE
    LE, AV
    MATYAS, SM
    JOHNSON, DB
    WILKINS, JD
    IBM SYSTEMS JOURNAL, 1993, 32 (03) : 461 - 485
  • [49] A public-key cryptographic processor for RSA and ECC
    Eberle, H
    Gura, N
    Shantz, SLC
    Gupta, V
    Rarick, L
    Sundaran, S
    15TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, PROCEEDINGS, 2004, : 98 - 110
  • [50] Public key cryptosystem based on two cryptographic assumptions
    Baocang, W
    Yupu, H
    IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (06): : 861 - 865