期刊文献+

MQ公钥密码体制等价密钥分析 被引量:5

Equivalent keys of multivariate quadratic public key cryptosystem
下载PDF
导出
摘要 MQ公钥密码体制存在多个私钥对应同一个公钥的问题.应用高斯不变算子对私钥空间进行等价分类,给出了任一私钥的等价类中所含元素的个数与明密文分量之间的关系式.该式表明,对任一公钥有指数级个私钥与之对应,从而使私钥(进而公钥)空间大量减少.同时,还给出了私钥的仿射结构的标准形,该形式具有稀疏性,从而能够有效地减少计算量,提高存储效率.最后,以R-SE(2)签名体制为例,分析了分层结构对体制安全性的影响. The multivariate quandratic cryptosystem has the problem that many superflous private keys correspond to the same public key. By applying the Gauss Sustainer, the private key space is partitioned into equivalence classes. And then, a relationship between the number of elements in any equivalence private key class and plaintext (ciphertext) is established. This formula shows the number of private keys corresponding to any given public key is exponential. Hence, the private (further the public) key space is reduced greatly. Moreover, the normal form of affine transformations of the private key is derived. It has the sparse characteristic, which will reduce computing complexity and improve the storage efficiency. Finally, the R-SE(2) public key signature scheme is taken for an example, and the security performance of this scheme affected by the step-structure is analyzed.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2009年第3期428-432,共5页 Journal of Xidian University
基金 国家自然科学基金资助(90604009,60503010)
关键词 多变量公钥密码 代数分析 等价密钥 高斯不变算子 R-SE(2) multivariate public key cryptosystem algebraic cryptanalysis equivalent keys Gauss sustainer R-SE(2)
  • 相关文献

参考文献10

  • 1Shor P. Polynomial-time Algorithms for Pime Faetorization and Discrete Logarithms on A Quantum Computer [J]. SIAM Journal on Computing, 1997, 26(5):1484-1509.
  • 2Garay M, Johnson D. Computers and Intractability -a Guide to the Theory of NP-Completeness [M]. San Francisco: W H Freeman and Company, 1979: 250-251.
  • 3Patarin J, Goubin L. Trapdoor One-way Permutations and Multivariate Polynomials [C]//International Conference on Information Security and Cryptology 1997 , LNCS: 1334. Berlin: Springer, 1999: 356-368.
  • 4European IST. NESSIE Project [EB/OL]. [2000-12-12]. http://www. cryptonessie. org.
  • 5Akkar M, Courtois N T, Duteuil R, et al. A Fast and Secure Implementation of Sflash [C]//PKC 2003, LNCS: 2567. Berlin: Springer, 2003: 267-278.
  • 6韦宝典,刘景伟,王新梅.NESSIE分组密码及其安全性分析[J].西安电子科技大学学报,2004,31(3):377-382. 被引量:5
  • 7Kipnis A, Shamir A. Cryptanalysis of the Oil and Vinegar Signature Scheme [C]//Advances in Cryptology-CRYPTO 1998, LNCS: 1462. Berlin: Springer, 1998: 257-267.
  • 8Wolf C, Preneel B. Equivalent Keys in HFE, C *, and Variations [C]//Proceedings of Mycrypt 2005, LNCS: 3725. Berlin: Springer, 2005: 33-49.
  • 9Wolf C, Preneel B. Superfluous Keys in Multivariate Quadratic Asymmetric Systems [C]//PKC 2005, LNCS 3386. Berlin: Springer, 2005: 275-287.
  • 10Kasahara M, Sakai R. A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme [J]. IEICE Trans on Fundamentals, 2004: E87-A(1) : 102-109.

二级参考文献2

共引文献4

同被引文献18

  • 1任金威,李文锋.由RSA实现的具有数字签名功能的Hill密码体制[J].计算机安全,2007(1):38-40. 被引量:5
  • 2黄贤通,李文锋,任金威.基于矩阵广义特征逆问题实现的具有数字签名功能的Hill密码体制[J].航空计算技术,2007,37(2):11-13. 被引量:5
  • 3RichardSpillman.经典密码学与现代密码学[M].叶阮健,曹英,张长富,译.北京:清华大学出版社,2005.
  • 4章照止.现代密码学基础[M].北京:北京邮电大学出版社,2005:11-13.
  • 5PaulGarrett.密码学导引[M].吴世忠,宋晓龙,郭涛,等译.北京:机械工业出版社,2008:111-117.
  • 6黄贤通,严深海.由整数Loewner矩阵实现的密码体系及其应用[C].宁波:’13全国计算机仿真技术学术会议论文集,2013:311-314.
  • 7Israr Ali Khan, Qing-Wen Wang. Matrix equations over an arbitrary regular ring[ C ]. Hangzhou, China:Preceedings of the third international work- shop on matrix analysis and applications, 2009:1 -4.
  • 8加勒特.密码学导引[M].吴世忠,宋晓龙,郭涛,等,译.北京:机械工业出版社,2008.
  • 9Khan I A, Wang Q W. Matrix equations MC + CTMT = B over an arbitrary regular ring[C]//Proceedings of the Third International Workshop on Matrix Analysis and Applications.2009: 1-4.
  • 10PaulGarrett著,吴世忠,宋晓龙,郭涛等译.密码学导引[M],北京:机械工业出版社,2008,111-117.

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部