期刊文献+

MFE密码系统的一种改进方案 被引量:1

An Improved Scheme of the "Medium-Field" Multivariate Cryptosystem
下载PDF
导出
摘要 为了能够抵御基于量子计算机的攻击方法,在2006年RSA会议上,Wang等人提出了一个新的多变量密码体制——"Medium-Field"密码系统(MFE),但被Ding等人用二阶线性化函数方程攻击方法攻破。本文把内部扰动的思想加在MFE密码系统之上,构建了该密码系统的一种新变形,并考察了该变形在线性化函数方程攻击下的安全性。经研究分析表明,该MFE密码系统变形几乎不存在二阶线性化函数方程。最后针对该变形选择合适的参数作了进一步分析,并且评估了其实现性能。 The "Medium-Field'Multivariate Public-Key Eneryption Scheme proposed by Wang et al has been attacked by Ding with the method of the second order linearization equations. The idea of internal perturbation is imposed on the MFE cryptosystem to construct a new variant. This new variant can be used to cope with the second order linearization equation attack,and has some improvement in the aspect of the space of key and security compared with other existing schemes.
出处 《计算机工程与科学》 CSCD 北大核心 2009年第8期17-20,共4页 Computer Engineering & Science
基金 现代通信国家重点实验室基金资助项目(9140C110206070C11)
关键词 多变量公钥密码 MFE 有限域 扰动 线性化函数方程 multivariate public key cryptosystem MFE finite field perturbation linearization equation
  • 相关文献

参考文献10

  • 1Shor P W. Polynomial-Time Algorithms for Prime Faetorization and Discrete Logarithms on a Quantum Computer[J]. SIAM Journal on Computing, 1997,26(5) : 1484-1509.
  • 2Garay M R, Johson D S. Computers and Intractability: A Guide to the Theory of NP2 Completeness [M]. New York : W H Freeman and Company,1979.
  • 3Goubin L, Patarin J. Trapdoor One-Way Permutations and Multivariate Polynomials [C]//Proc of ICICS&apos' 97, 1997: 356-368.
  • 4Partarin J. Hidden Field Equations(HFE) and Isomorphismof Polynomial(IP):Two New Families of Asym-metric Algorithms[C]//Proc of Eurocrpyt' 96, 1996: 33-48.
  • 5Fell H, Diffie W. Analysis of a Public Key Approach Based on Polynomial Substitution [C]//Proc of Crypto' 85, 1985 340-349.
  • 6巫治平,叶顶锋,马卫局.TTM密码系统的扰动变形[J].计算机研究与发展,2006,43(12):2082-2087. 被引量:3
  • 7Courtois N, Goubin L,Patafin J. SFlash: Primitive Specification and Supporting Documentation[EB/OL]. [2002-05-07]. https://www. cosic. esat. kuleuven. be/nessie.
  • 8Ding J, Schraidt D. Rainbow, A New Multivafiable Polynomial Signature Scheme[C] //Proc of Applied Cryptography and Network Sccurity,2005:164-175.
  • 9Wang Lih-Chung, Yang Bo-yin, Hu Yuh-hua,et al. A Medium-Field Multivariate Public key Eneryption Scheme[C]// Proc of Topics in Cryptology,2006:132-149.
  • 10Ding Jintai, Hu Lei, Nie Xuyun, et al. High Oder Linearization Equation Attack on Multivariate Public Key Cryptosystems[EB/OL]. [2008-05-12]. http://eprint. iacr. org/ 2006/336. pdf.

二级参考文献14

  • 1T Moh.A public key sytem with signature and master key functions[J].Communications in Algebra,1999,27:2207,2222
  • 2Louis Goubin,Nicolas T Courtois.Cryptanalysis of the TTM cryptosystem[G].In:Proc of Asiacrypt'2000,LNCS 1976.Berlin:Springer-Verlag,2000.44-57
  • 3T Moh,J M Chen.On the Goubin-Courtois attack on TTM[OL].Http://eprint.iacr.org/2001/072/,2005
  • 4Jintai Ding,D Schmidt.A defect of the implementation schemes of the TTM cryptosystem[OL].Http://eprint.iacr.org/2003/084/,2005
  • 5T Moh,J M Chen,B Y Yang.Building instances of TTM immune to the Goubin-Courtois attack and the Ding-Schmidt attack[OL].Http://eprint.iacr.org/2004/168,2005
  • 6Jintai Ding.A new variant of the Matsumoto-Imai cryptosystem through perturbation[G].In:Proc of PKC'2004,LNCS 2947.Berlin:Springer-Verlag,2004.305-318
  • 7Jintai Ding.Cryptanalysis of HFEV and internal perturbation of HFE[G].In:Proc of PKC'2005,LNCS 3386.Berlin:Springer-Verlag,2005.288-301
  • 8Zhiping Wu,Jintai Ding,Dingfeng Ye.Perturbed hidden matrix cryptosystems[G].In:Proc of ICCSA'2005,LNCS 3481.Berlin:Springer-Verlag,2005.595-602
  • 9Nicolas T Courtois.The security of hidden field equations(HFE)[G].In:Proc of CT-RSA'2001,LNCS 2020.Springer-Verlag,2001.266-281
  • 10Jacques Patarin.Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypto'96[J].Designs,Codes and Cryptography,2000,20(2):175-209

共引文献2

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部