期刊文献+

一种优化的多变量加密方案 被引量:1

An Optimized Multivariable Encryption Scheme
下载PDF
导出
摘要 在对原MFE加密方案进行了分析,它不能抵抗SOLE攻击;在原有基础上改进了原方案的中心映射,改进的方案使攻击者不能得到相关的线性化方程,从而抵抗SOLE攻击;分析表明新方案不仅能够抵御SOLE攻击,而且能抵御秩攻击和Grobner攻击,是一种更为安全的多变量公钥加密方案。 This paper analyzes original Medium-Field Encryption (MFE) scheme because it can not resist SOLE attack and improves the central mapping of the original scheme based on original MFE.The revamped scheme makes the attacker not obtain the related linearized equation so that the revamped scheme can resist SOLE attack Analysis shows that the new scheme, which can not only resist SOLE attack, but also resist rank attack and Grobner attack, is a kind of more secure muhivariable public key encryption scheme.
出处 《重庆工商大学学报(自然科学版)》 2013年第12期52-56,共5页 Journal of Chongqing Technology and Business University:Natural Science Edition
基金 国家自然科学基金资助项目(60573026) 安徽省自然科学研究项目(KJ2011B146)
关键词 多变量公钥加密方案 线性化方程 Medium—Field muhivariable public key encryption scheme linearized equation Medium-Field
  • 相关文献

参考文献8

二级参考文献59

  • 1王鑫,张美玲,王新梅.高次MFE多变量加密方案[J].四川大学学报(工程科学版),2009,41(4):171-175. 被引量:6
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 3唐樨瑾,冯勇.Dixon结式在密码学中的应用[J].软件学报,2007,18(7):1738-1745. 被引量:9
  • 4管海明.公钥密码如何应对量子计算的挑战?[J].信息安全与通信保密,2007,29(8):53-54. 被引量:2
  • 5SHOR P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[ J]. SIAM J Computer, 1997(5): 1484-1509.
  • 6DING J T. Multivariate public key cryptosystems[ M]. Berlin: Springer-Verlag, 2006: 1-10.
  • 7GAREY M, JOHNSON D. Computers and intractability, a guide to the theory of NP-completeness[ M]. New York: Freeman, 1979: 128-130.
  • 8PATARIN J, GOUBIN J. Trapdoor one-way permutati-ons and multivariate polynomials [ C] // Proceedings of ICISC 1997. Berlin: Springer-Verlag, 1997 : 356-368.
  • 9PATARIN J. Hidden field equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms[ C]//Proceedings of Eurocrypt 1996. Berlin: Springer-Verlag, 1996 : 33-48.
  • 10FAUGERE J C. A new efficient algorithm for computing Grobner bases without reduction to zero (F5) [ C ] //Proceedings of ISSAC2002. New York: ACM Press, 2002: 75-83.

共引文献16

同被引文献5

  • 1BENNETT C H, BRASSARD G. Quantum Cryptography: Public Key Distribution and Coin Tossing [ J ]. IEEE on Computers Systems and Signal Porcessing, 1984(12) : 175-179.
  • 2ZHA X W, ZOU Z C, QI J X. Bidirectional Quantum Comrolled Tdeportation via Five-Qubit Cluster State[ J]. Int J Theor Phys, 2013 (52) : 1740-1744.
  • 3LI Y H, NIE L P. Bidirectional Controlled Teleportation by Using a Five-Qubit Composite GHZ-Bell State [ J ]. Int J Theor Phys, 2013( 11 ) : 1630-1634.
  • 4YAN A. Bidirectional Controlled Teleportation via Six-Qubit Cluster State[ J ]. Int J Theor Phys,2013 (52) :3870-3873.
  • 5FU H Z,TIAN X L,HU Y. A General Method of Selecting Quantum Channel for Bidirectional Quantum Teleportation[ J]. Int J Theor Phys ,2014(53) : 1840-1847.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部