Extended multivariate public key cryptosystems with secure encryption function

被引:0
|
作者
HouZhen Wang
HuanGuo Zhang
ZhangYi Wang
Ming Tang
机构
[1] Wuhan University,The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Computer
[2] Wuhan University,State Key Laboratory of Software Engineering
来源
关键词
cryptography; post-quantum cryptography; MQ problem; hash function;
D O I
暂无
中图分类号
学科分类号
摘要
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational power, multivariate public key cryptosystems (MPKCs) have attracted increasing attention in recently years. Unfortunately, the existing MPKCs can only be used as a multivariate signature scheme, and it remains unknown how to construct an efficient MPKC enabling secure encryption. Furthermore, some multivariate signature schemes have been shown insecure in recent years, and it is also not trivial to build MPKC which can serve as a secure signature scheme. By employing the basic MQ-trapdoors, this paper proposes a novel MPKC and shows how it can be used as a multivariate signature scheme and a multivariate encryption scheme, respectively. The goal is achieved by incorporating our new hash authentication techniques and some modification methods such as the Shamir’s minus method. Thorough analysis shows that our schemes are secure and efficient. Our MPKC gives a positive response to the challenges in multivariate public key cryptography.
引用
收藏
相关论文
共 50 条
  • [21] Ring signature scheme based on multivariate public key cryptosystems
    Wang, Shangping
    Ma, Rui
    Zhang, Yaling
    Wang, Xiaofeng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 62 (10) : 3973 - 3979
  • [22] An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map
    Tan, Tao
    Zhang, Liming
    Liu, Shuaikang
    Wang, Lei
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [23] Software Implementation of a Pairing Function for Public Key Cryptosystems
    Kanbara, Yusuke
    Teruya, Tadanori
    Kanayama, Naoki
    Nishide, Takashi
    Okamoto, Eiji
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [24] How to implement cost-effective and secure public key cryptosystems
    Lee, PJ
    Lee, EJ
    Kim, YD
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, 1999, 1717 : 73 - 79
  • [25] Secure key-evolving for public key cryptosystems based on the discrete logarithm problem
    Lu, CF
    Shieh, SP
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2004, 20 (02) : 391 - 400
  • [26] Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems
    Chen, Jiahui
    Ling, Jie
    Ning, Jianting
    Ding, Jintai
    COMPUTER JOURNAL, 2019, 62 (08): : 1132 - 1147
  • [27] PUBLIC KEY CRYPTOSYSTEMS
    ELKATEEB, A
    ALKHAYATT, S
    INFORMATION AGE, 1983, 5 (04): : 232 - 237
  • [28] On the Power of Public-Key Encryption in Secure Computation
    Mahmoody, Mohammad
    Maji, Hemanta K.
    Prabhakaran, Manoj
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 240 - 264
  • [29] Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography
    Debnath, Sumit Kumar
    Mesnager, Sihem
    Dey, Kunal
    Kundu, Nibedita
    MEDITERRANEAN JOURNAL OF MATHEMATICS, 2021, 18 (05)
  • [30] Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography
    Sumit Kumar Debnath
    Sihem Mesnager
    Kunal Dey
    Nibedita Kundu
    Mediterranean Journal of Mathematics, 2021, 18