Extended multivariate public key cryptosystems with secure encryption function

被引:0
|
作者
HouZhen Wang
HuanGuo Zhang
ZhangYi Wang
Ming Tang
机构
[1] Wuhan University,The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Computer
[2] Wuhan University,State Key Laboratory of Software Engineering
来源
关键词
cryptography; post-quantum cryptography; MQ problem; hash function;
D O I
暂无
中图分类号
学科分类号
摘要
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational power, multivariate public key cryptosystems (MPKCs) have attracted increasing attention in recently years. Unfortunately, the existing MPKCs can only be used as a multivariate signature scheme, and it remains unknown how to construct an efficient MPKC enabling secure encryption. Furthermore, some multivariate signature schemes have been shown insecure in recent years, and it is also not trivial to build MPKC which can serve as a secure signature scheme. By employing the basic MQ-trapdoors, this paper proposes a novel MPKC and shows how it can be used as a multivariate signature scheme and a multivariate encryption scheme, respectively. The goal is achieved by incorporating our new hash authentication techniques and some modification methods such as the Shamir’s minus method. Thorough analysis shows that our schemes are secure and efficient. Our MPKC gives a positive response to the challenges in multivariate public key cryptography.
引用
收藏
相关论文
共 50 条
  • [31] A Secure Accountability Protocol Based on Public Key Encryption
    Techapanupreeda, Chian
    Kungpisdan, Supakorn
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2491 - 2495
  • [32] Tightly Secure Signatures and Public-Key Encryption
    Hofheinz, Dennis
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 590 - 607
  • [33] Tightly secure signatures and public-key encryption
    Hofheinz, Dennis
    Jager, Tibor
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (01) : 29 - 61
  • [34] Towards Tightly Secure Deterministic Public Key Encryption
    Zhang, Daode
    Li, Bao
    Liu, Yamin
    Xue, Haiyang
    Lu, Xianhui
    Jia, Dingding
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 154 - 161
  • [35] Tightly secure signatures and public-key encryption
    Dennis Hofheinz
    Tibor Jager
    Designs, Codes and Cryptography, 2016, 80 : 29 - 61
  • [36] ZHFE, a New Multivariate Public Key Encryption Scheme
    Porras, Jaiberth
    Baena, John
    Ding, Jintai
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 229 - 245
  • [37] A Multivariate Public Key Encryption Scheme With Equality Test
    Shen, Xiaoying
    Wang, Licheng
    Zhu, Huijun
    Liu, Yuan
    IEEE ACCESS, 2020, 8 : 75463 - 75472
  • [38] ZHFE, A New Multivariate Public Key Encryption Scheme
    Porras, Jaiberth
    Baena, John
    Ding, Jintai
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 229 - 245
  • [39] Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
    Emura, Keita
    Hanaoka, Goichiro
    Nuida, Koji
    Ohtake, Go
    Matsuda, Takahiro
    Yamada, Shota
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (08) : 1623 - 1683
  • [40] Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
    Keita Emura
    Goichiro Hanaoka
    Koji Nuida
    Go Ohtake
    Takahiro Matsuda
    Shota Yamada
    Designs, Codes and Cryptography, 2018, 86 : 1623 - 1683