The Cubic Simple Matrix Encryption Scheme

被引:0
|
作者
Ding, Jintai [1 ]
Petzoldt, Albrecht [3 ]
Wang, Lih-chung [2 ]
机构
[1] Univ Cincinnati, Cincinnati, OH 45221 USA
[2] Natl Dong Hwa Univ, Taipei, Taiwan
[3] TU, Darmstadt, Germany
来源
关键词
Multivariate Cryptography; Simple Matrix Encryption Scheme; Provable Security; COMPUTING GROBNER BASES; EFFICIENT ALGORITHM; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an improved version of the Simple Matrix encryption scheme of PQCrypto2013. The main goal of our construction is to build a system with even stronger security claims. By using square matrices with random quadratic polynomials, we can claim that breaking the system using algebraic attacks is at least as hard as solving a set of random quadratic equations. Furthermore, due to the use of random polynomials in the matrix A, Rank attacks against our scheme are not feasible.
引用
收藏
页码:76 / 87
页数:12
相关论文
共 50 条
  • [21] Secret Sharing Scheme for Image Encryption Using New Transformation Matrix
    Selvi, A. Kalai
    Sathik, M. Mohamed
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 647 - +
  • [22] A generalized scheme for data encryption technique using a randomized matrix key
    Krishna, A. V. N.
    Pandit, S. N. N.
    Babu, A. Vinaya
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (01): : 73 - 81
  • [23] Medical image encryption scheme based on self-verification matrix
    Man, Zhenlong
    Li, Jinqing
    Di, Xiaoqiang
    IET IMAGE PROCESSING, 2021, 15 (12) : 2787 - 2798
  • [24] A Simple Modulation Scheme for a Regenerative Cascaded Matrix Converter
    Rojas, C.
    Rodriguez, J.
    Iqbal, Atif
    Abu-Rub, H.
    Wilson, A.
    Ahmed, Sk. Moin
    IECON 2011: 37TH ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2011, : 4361 - 4366
  • [25] A simple chaotic base encryption scheme for securing OFDM-PON communications
    Ridha O.A.L.A.
    Jabori H.A.A.
    Mohammed H.A.
    Journal of Optical Communications, 2024, 45 (04) : 779 - 785
  • [26] A new anti-forensic tool based on a simple data encryption scheme
    Lee, Sang Su
    Chang, Ku-Young
    Lee, Deokgyu
    Hong, Dowon
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 114 - 118
  • [27] A simple embed over encryption scheme for DICOM images using Bulban Map
    Manikandan, Veerappan
    Amirtharajan, Rengarajan
    MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2022, 60 (03) : 701 - 717
  • [28] Novel Scheme for Image Encryption and Decryption Based on a Hermite-Gaussian Matrix
    Alsaedi, Mohammed
    ADVANCES IN COMPUTER VISION, CVC, VOL 1, 2020, 943 : 222 - 236
  • [29] Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm
    Zhang Leihong
    Wang Yang
    Ye Hualong
    Xu Runchu
    Zhang Dawei
    CURRENT OPTICS AND PHOTONICS, 2021, 5 (06) : 686 - 698
  • [30] Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles
    Fan, Kai
    Kang, Junbin
    Zhu, Shanshan
    Li, Hui
    Yang, Yintang
    SENSORS, 2019, 19 (01)