Extended multivariate public key cryptosystems with secure encryption function

被引:0
|
作者
HouZhen Wang
HuanGuo Zhang
ZhangYi Wang
Ming Tang
机构
[1] Wuhan University,The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Computer
[2] Wuhan University,State Key Laboratory of Software Engineering
来源
关键词
cryptography; post-quantum cryptography; MQ problem; hash function;
D O I
暂无
中图分类号
学科分类号
摘要
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational power, multivariate public key cryptosystems (MPKCs) have attracted increasing attention in recently years. Unfortunately, the existing MPKCs can only be used as a multivariate signature scheme, and it remains unknown how to construct an efficient MPKC enabling secure encryption. Furthermore, some multivariate signature schemes have been shown insecure in recent years, and it is also not trivial to build MPKC which can serve as a secure signature scheme. By employing the basic MQ-trapdoors, this paper proposes a novel MPKC and shows how it can be used as a multivariate signature scheme and a multivariate encryption scheme, respectively. The goal is achieved by incorporating our new hash authentication techniques and some modification methods such as the Shamir’s minus method. Thorough analysis shows that our schemes are secure and efficient. Our MPKC gives a positive response to the challenges in multivariate public key cryptography.
引用
收藏
相关论文
共 50 条
  • [41] Efficient public-key cryptosystems provably secure against active adversaries
    Paillier, P
    Pointcheval, D
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 165 - 179
  • [42] Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC
    Kobara, K
    Imai, H
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 19 - 35
  • [43] Strong designated verifier signature scheme from multivariate public key cryptosystems
    Wang, Shang-Ping
    Bai, Yue
    Liu, Li-Hua
    Chen, Juan-Juan
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (10): : 2331 - 2335
  • [44] High order linearization equation (HOLE) attack on multivariate public key cryptosystems
    Ding, Jintai
    Hu, Lei
    Nie, Xuyun
    Li, Jianyu
    Wagner, John
    PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 233 - +
  • [45] Quaternion Public Key Cryptosystems
    Valluri, Maheswara Rao
    Narayan, Shailendra Vikash
    2016 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2016, : 48 - 51
  • [46] Indifferentiability for Public Key Cryptosystems
    Zhandry, Mark
    Zhang, Cong
    ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 63 - 93
  • [47] Multivariable public key cryptosystems
    Ding, Jintai
    Schmidt, Dieter
    Algebra and its Applications, 2006, 419 : 79 - 94
  • [48] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [49] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [50] Provably secure and efficient escrowable public key encryption schemes
    Liu, Wen-Hao
    Wang, Sheng-Bao
    Cao, Zhen-Fu
    Han, Li-Dong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 33 - 37