Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure

被引:0
|
作者
Cao, Weiwei [1 ]
Hu, Lei [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
来源
关键词
Multivariate public key encryption; internal perturbation; quadratic polynomial; differential attack; ALGORITHMS; MATSUMOTO;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, Wang et al proposed a new middle-field type scheme for multivariate public key encryption. There are three equations in the central map, so it is convenient to name it TH. They found that some linearization equations can be derived for TH and to overcome this defect, they combined the internal perturbation and plus methods to obtain an improved scheme which we call PTH+. They claimed that PTH+ can resist all known types of attacks, including differential attack, and to ensure it achieves a security level higher than 2(80), they suggested the parameter is taken as (l, r, m) = (47, 6, 11). In this paper, we show that TH has a much weaker structure than what is analyzed by the inventors and it can be totally cracked by linearization attack. For PTH+, we propose a method to reduce the attack against PTH+ to an attack on TH+ (a plus variant of TH) using the property on its differentials, which was originally regarded as impossible by that authors. The total complexity of our attack is 2(l+r+1)(2l)(w) approximate to 2(72), which is independent on the number m of the additional random quadratic equations by the plus method and disproves the claim in their original paper that the larger is the m, the securer is PTH+.
引用
收藏
页码:254 / 267
页数:14
相关论文
共 50 条
  • [11] Equivalent keys of medium field multivariate public key encryption scheme
    Wang, Xin
    Sun, Chen
    Wang, Xinmei
    Journal of Computational Information Systems, 2009, 5 (05): : 1403 - 1408
  • [12] Cryptanalysis on Public Key Encryption Scheme Using Ergodic Matrices over GF(2)
    Gu Chun-sheng
    Yu Zhi-ming
    Jing Zheng-jun
    Gu Jixing
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 93 - 96
  • [13] Improved medium-field multivariate public key encryption scheme
    Wang, Zhi-Wei
    Zheng, Shi-Hui
    Yang, Yi-Xian
    Zhang, Zhi-Hui
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (06): : 1152 - 1154
  • [14] A "medium-field" multivariate public-key encryption scheme
    Wang, LC
    Yang, BY
    Hu, YH
    Lai, FP
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 132 - 149
  • [15] Cryptanalysis of Rational Multivariate Public Key Cryptosystems
    Ding, Jintai
    Wagner, John
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 124 - 136
  • [16] A Medium Field Multivariate Public key Signature Scheme with External Perturbation
    Tian, Li
    Bao, Wansu
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 753 - 757
  • [17] Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server
    Zhang, Nan
    Qin, Baodong
    Zheng, Dong
    IET INFORMATION SECURITY, 2025, 2025 (01)
  • [18] Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes
    Wang Houzhen
    Shen Changxiang
    Xu Zhengquan
    Zhang Huanguo
    CHINA COMMUNICATIONS, 2011, 8 (04) : 23 - 31
  • [19] Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange
    Jiang X.
    Huang H.
    Pan G.
    Journal of Cyber Security and Mobility, 2023, 12 (02): : 205 - 220
  • [20] Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
    Tsaban, Boaz
    Lifshitz, Noam
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 75 - 78