Extended multivariate public key cryptosystems with secure encryption function

被引:0
|
作者
HouZhen Wang
HuanGuo Zhang
ZhangYi Wang
Ming Tang
机构
[1] Wuhan University,The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Computer
[2] Wuhan University,State Key Laboratory of Software Engineering
来源
关键词
cryptography; post-quantum cryptography; MQ problem; hash function;
D O I
暂无
中图分类号
学科分类号
摘要
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational power, multivariate public key cryptosystems (MPKCs) have attracted increasing attention in recently years. Unfortunately, the existing MPKCs can only be used as a multivariate signature scheme, and it remains unknown how to construct an efficient MPKC enabling secure encryption. Furthermore, some multivariate signature schemes have been shown insecure in recent years, and it is also not trivial to build MPKC which can serve as a secure signature scheme. By employing the basic MQ-trapdoors, this paper proposes a novel MPKC and shows how it can be used as a multivariate signature scheme and a multivariate encryption scheme, respectively. The goal is achieved by incorporating our new hash authentication techniques and some modification methods such as the Shamir’s minus method. Thorough analysis shows that our schemes are secure and efficient. Our MPKC gives a positive response to the challenges in multivariate public key cryptography.
引用
收藏
相关论文
共 50 条
  • [1] Extended multivariate public key cryptosystems with secure encryption function
    WANG HouZhen 1
    2 State Key Laboratory of Software Engineering
    [J]. Science China(Information Sciences), 2011, 54 (06) : 1161 - 1171
  • [2] Extended multivariate public key cryptosystems with secure encryption function
    Wang HouZhen
    Zhang HuanGuo
    Wang ZhangYi
    Tang Ming
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (06) : 1161 - 1171
  • [3] Efficient and secure public-key cryptosystems
    Takagi, T
    [J]. CONTEMPORARY CRYPTOLOGY, 2005, : 191 - 237
  • [4] On the Differential Security of Multivariate Public Key Cryptosystems
    Smith-Tone, Daniel
    [J]. POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 130 - 142
  • [5] Cryptanalysis of Rational Multivariate Public Key Cryptosystems
    Ding, Jintai
    Wagner, John
    [J]. POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 124 - 136
  • [6] Building secure tame-like multivariate public-key cryptosystems: The new TTS
    Yang, BY
    Chen, JM
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 518 - 531
  • [7] Public Key Encryption with Secure Key Leasing
    Agrawal, Shweta
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    Yamada, Shota
    Yamakawa, Takashi
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 581 - 610
  • [8] A New Secure Channel Free Public Key Encryption with Keyword Search Scheme Based on ElGamal Cryptosystems
    Hwang, Min-Shiang
    Hsu, Shih-Ting
    Yang, Cheng-Ying
    [J]. International Journal of Network Security, 2023, 25 (06): : 1070 - 1076
  • [9] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    [J]. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [10] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    [J]. New Generation Computing, 2005, 23 : 259 - 275