Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure

被引:0
|
作者
Cao, Weiwei [1 ]
Hu, Lei [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
来源
关键词
Multivariate public key encryption; internal perturbation; quadratic polynomial; differential attack; ALGORITHMS; MATSUMOTO;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, Wang et al proposed a new middle-field type scheme for multivariate public key encryption. There are three equations in the central map, so it is convenient to name it TH. They found that some linearization equations can be derived for TH and to overcome this defect, they combined the internal perturbation and plus methods to obtain an improved scheme which we call PTH+. They claimed that PTH+ can resist all known types of attacks, including differential attack, and to ensure it achieves a security level higher than 2(80), they suggested the parameter is taken as (l, r, m) = (47, 6, 11). In this paper, we show that TH has a much weaker structure than what is analyzed by the inventors and it can be totally cracked by linearization attack. For PTH+, we propose a method to reduce the attack against PTH+ to an attack on TH+ (a plus variant of TH) using the property on its differentials, which was originally regarded as impossible by that authors. The total complexity of our attack is 2(l+r+1)(2l)(w) approximate to 2(72), which is independent on the number m of the additional random quadratic equations by the plus method and disproves the claim in their original paper that the larger is the m, the securer is PTH+.
引用
收藏
页码:254 / 267
页数:14
相关论文
共 50 条
  • [21] Cryptanalysis of a Public Key Encryption Scheme Based on QC-LDPC and QC-MDPC Codes
    Dragoi, Vlad
    Kalachi, Herve Tale
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (02) : 264 - 267
  • [22] Cryptanalysis and improvement of "group public key encryption scheme supporting equality test without bilinear pairings"
    Zhang, Qijia
    Tian, Youliang
    INFORMATION SCIENCES, 2024, 665
  • [23] Cryptanalysis of the public-key encryption based on braid groups
    Lee, E
    Park, JH
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 477 - 490
  • [24] Cryptanalysis of the public key encryption based on multiple chaotic systems
    Zhang, Linhua
    CHAOS SOLITONS & FRACTALS, 2008, 37 (03) : 669 - 674
  • [25] A new construction of multivariate public key encryption scheme through internally perturbed plus
    Wang, Zhiwei
    Nie, Xuyun
    Zheng, Shihui
    Yang, Yixian
    Zhang, Zhihui
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 1 - +
  • [26] Cryptanalysis of a homomorphic encryption scheme
    Sonia Bogos
    John Gaspoz
    Serge Vaudenay
    Cryptography and Communications, 2018, 10 : 27 - 39
  • [27] A Multivariate Public Key Cryptographic Scheme
    Yuan Feng
    Sun Ying
    Jiang Jijun
    Zhao Shangwei
    Xu Shengwei
    CHINA COMMUNICATIONS, 2014, 11 (12) : 120 - 124
  • [28] Cryptanalysis of an image encryption scheme
    Li, Shujun
    Li, Chengqing
    Lo, Kwok-Tung
    Chen, Guanrong
    JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [29] Cryptanalysis of a homomorphic encryption scheme
    Bogos, Sonia
    Gaspoz, John
    Vaudenay, Serge
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 27 - 39
  • [30] Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    INFORMATICA, 2012, 23 (04) : 537 - 562