期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes 被引量:4
1
作者 王后珍 沈昌祥 +1 位作者 徐正全 张焕国 《China Communications》 SCIE CSCD 2011年第4期23-31,共9页
Advances in quantum computers pose potential threats to the currently used public-key cryptographic algorithms such as RSA and ECC.As a promising candidate against attackers equipped with quantum computational power,M... Advances in quantum computers pose potential threats to the currently used public-key cryptographic algorithms such as RSA and ECC.As a promising candidate against attackers equipped with quantum computational power,Multivariate Public-Key Cryptosystems(MPKCs)has attracted increasing attention in recently years.Unfortunately,the existing MPKCs can only be used as multivariate signature schemes,and the way to construct an efficient MPKC enabling secure encryption remains unknown.By employing the basic MQ-trapdoors,this paper proposes a novel multivariate encryption scheme by combining MPKCs and code-based public-key encryption schemes.Our new construction gives a positive response to the challenges in multivariate public key cryptography.Thorough analysis shows that our scheme is secure and efficient,and its private key size is about 10 times smaller than that of McEliece-type cryptosystems. 展开更多
关键词 cryptography multivariate public key cryptosystems Goppa codes
下载PDF
A Multivariate Public Key Cryptographic Scheme 被引量:5
2
作者 YUAN Feng SUN Ying +2 位作者 JIANG Jijun ZHAO Shangwei XU Shengwei 《China Communications》 SCIE CSCD 2014年第12期120-124,共5页
This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is a... This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is analyzed in detail,and this paper indicates that the scheme can withstand the up to date differential cryptanalysis.We give heuristic arguments to show that this scheme resists all known attacks. 展开更多
关键词 public key cryptography polynomials multivariate finite field
下载PDF
基于LRPC码和多变量的签密方案 被引量:6
3
作者 韩益亮 蓝锦佳 杨晓元 《密码学报》 CSCD 2016年第1期56-66,共11页
多变量密码和纠错编码密码作为后量子密码中的两个候选方案,因其都具备较高的效率和抗量子攻击的特性,成为密码学研究的新热点.然而,在对多变量密码的研究当中,核心映射的构造一直是研究的重点和难点,因此利用新方法构造核心映射是一个... 多变量密码和纠错编码密码作为后量子密码中的两个候选方案,因其都具备较高的效率和抗量子攻击的特性,成为密码学研究的新热点.然而,在对多变量密码的研究当中,核心映射的构造一直是研究的重点和难点,因此利用新方法构造核心映射是一个热门方向.另一方面,因为纠错编码密码在编码上具备数据压缩传输的优势,且与多变量密码在形式上的相似——矩阵运算,给构造多变量密码核心映射提供了新思路.本文针对多变量核心映射构造和数据压缩加密的问题,结合LRPC(Low Rank Parity Check)码和Cubic Simple Matrix加密方案的特点,利用秩矩阵码密钥量小的优势,设计了一种新的核心映射构造方法,由此提出了一个结合纠错编码的多变量签密方案.通过分析,表明方案具备了多变量密码和纠错编码密码的特点,在不明显增加密钥量和降低安全性的前提下,降低了原方案的密文扩展率,同时实现了加密和签名,使得用户和数据中心在传递数据时具备编码密码的优势.另外,在随机预言机模型下证明了方案具备IND-CCA2安全和EUF-CMA安全. 展开更多
关键词 多变量公钥密码 编码密码 核心映射 可证明安全
下载PDF
多变量强指定验证者签名方案
4
作者 王尚平 白越 +1 位作者 刘丽华 陈娟娟 《电子与信息学报》 EI CSCD 北大核心 2014年第10期2331-2335,共5页
指定验证者签名在实际的网络信息中有着广泛的应用,验证者不能将签名任意地传播给第三方。强指定验证者签名方案更加强了签名者的隐私,除了指定验证者任何人都不能验证签名的有效性。该文提出一个基于多变量公钥密码体制(MPKCs)的一般... 指定验证者签名在实际的网络信息中有着广泛的应用,验证者不能将签名任意地传播给第三方。强指定验证者签名方案更加强了签名者的隐私,除了指定验证者任何人都不能验证签名的有效性。该文提出一个基于多变量公钥密码体制(MPKCs)的一般强指定验证者签名方案,将多变量公钥密码体制应用到指定验证者签名方案中,如果多变量公钥密码体制在已知攻击,包括代数攻击,线性化攻击,秩攻击和差分攻击等下是安全的,则新方案满足正确性、不可伪造性、不可传递性的安全性要求。并给出一个具体的基于pFLASH签名体制的强指定验证者签名方案,具有明显的效率优势,新方案在量子计算攻击下是安全的。 展开更多
关键词 密码学 强指定验证者签名 多变量公钥密码体制 数字签名 pFLASH
下载PDF
一种改进的多变量数字签名方案安全性分析 被引量:2
5
作者 鲁晓彬 李发达 +1 位作者 田礼 鲍皖苏 《计算机工程》 CAS CSCD 2012年第22期95-98,共4页
在改进的多变量数字签名方案W-方案中,增加了一个仿射变换N替换仿射变换T,并使用公钥P2=N·Q·S参与签名验证,但由于N可以与T合成新的仿射变换,因此不能有效隐藏签名结构P1=T·Q·S。针对该方案存在的安全漏洞,通过刻... 在改进的多变量数字签名方案W-方案中,增加了一个仿射变换N替换仿射变换T,并使用公钥P2=N·Q·S参与签名验证,但由于N可以与T合成新的仿射变换,因此不能有效隐藏签名结构P1=T·Q·S。针对该方案存在的安全漏洞,通过刻画验证公钥P2与P1=T·Q·S之间的关系,利用h·T-1(v)=h·N-1(w)确定P1的结构,由此实现攻击,从中可知,增加仿射变换不能提高多变量数字签名方案的安全性。 展开更多
关键词 多变量公钥密码体制 HASH函数 数字签名 W-方案 量子计算机 秘密仿射变换
下载PDF
New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem 被引量:1
6
作者 Houzhen Wang Huanguo Zhang +2 位作者 Shaowu Mao Wanqing Wu Liqiang Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期302-311,共10页
During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography (MPKC), which is considered to be an important candidate for post-quantum cryptography. However, it ... During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography (MPKC), which is considered to be an important candidate for post-quantum cryptography. However, it is universally regarded as a difficult task, as in the Knapsack cryptosystems, to design a secure MPKC scheme (especially an encryption scheme) employing the existing trapdoor construction. In this paper, we propose a new key-exchange scheme and an MPKC scheme based on the Morphism of Polynomials (MP) problem. The security of the proposed schemes is provably reducible to the conjectured intractability of a new difficult problem, namely the Decisional Multivariate Diffie-Hellman (DMDH) problem derived from the MP problem. The proposed key agreement is one of several non-number-theory-based protocols, and is a candidate for use in the post-quantum era. More importantly, by slightly modifying the protocol, we offer an original approach to designing a secure MPKC scheme. Furthermore, the proposed encryption scheme achieves a good tradeoff between security and efficiency, and seems competitive with traditional MPKC schemes. 展开更多
关键词 public key cryptosystem key exchange multivariate public key cryptography mpkc Morphism ofPolynomials (MP) problem
原文传递
Practical Cryptanalysis of a Public Key Cryptosystem Based on the Morphism of Polynomials Problem 被引量:1
7
作者 Jaihui Chen Chik How Tan Xiaoyu Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第6期671-679,共9页
Multivariate Public Key Cryptography (MPKC) has intensively and rapidly developed during the past three decades. MPKC is a promising candidate for post-quantum cryptography. However, designing it is universally rega... Multivariate Public Key Cryptography (MPKC) has intensively and rapidly developed during the past three decades. MPKC is a promising candidate for post-quantum cryptography. However, designing it is universally regarded as a difficult task to design a secure MPKC foundation scheme, such as an encryption scheme and key exchange scheme. In this work, we investigate the security of a new public key cryptosystem that is based on the Morphism of Polynomials (MP). The public key cryptosystem proposed by Wang et al. (Wuhan University, China) comprises a key exchange scheme and encryption scheme. Its security can be provably reduced to the hardness of solving a new difficult problem, namely, the Decisional Multivariate Diffie Hellman (DMDH) problem. This problem Js a variant of the MP problem, which is difficult to solve by random systems. We present a proposition that reduces the DMDH problem to an easy example of the MP problem. Then, we propose an efficient algorithm for the Key Recover Attack (KRA) on the schemes of the public key cryptosystem. In practice, we are able to entirely break the cryptosystem's claimed parameter of 96 security levels in less than 17.252 s. Furthermore, we show that finding parameters that yield a secure and practical scheme is impossible. 展开更多
关键词 CRYPTANALYSIS post-quantum cryptography multivariate public key cryptosystems morphism ofpolynomials problem
原文传递
New Multivariate-Based Certificateless Hybrid Signcryption Scheme for Multi-Recipient 被引量:2
8
作者 HAN Yiliang YUE Zelun +1 位作者 FANG Dingyi YANG Xiaoyuan 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期433-440,共8页
With the development of quantum computer, multivariate public key cryptography withstanding quantum attack has became one of the research focus. The existed signcryption schemes from discrete logarithm and bilinear pa... With the development of quantum computer, multivariate public key cryptography withstanding quantum attack has became one of the research focus. The existed signcryption schemes from discrete logarithm and bilinear paring are facing the serious threats. Based on multivariate public key cryptography, a new certificateless multi-receiver hybrid signcryption scheme has been proposed. The proposal reduced the cipher text and could handle arbitrary length messages by employing randomness reusing and hybrid encryption, as well as keeping security. In the random oracle model, the scheme's confidentiality could withstand the IND-CCA2 adversary and its unforgeability could withstand the UF-CMA adversary under the hardness of multivariat quadratic (MQ) problem and isomorphism of polynomials (IP) assumption. It has less computation overhead and higher transmission efficiency than others. It reduced 33% cipher data compared with the existed similar scheme. 展开更多
关键词 multivariate public key cryptography certificateless hybrid signcryption multi-receiver post-quantum cryptography
原文传递
标准模型下可证明安全的多变量加密方案 被引量:1
9
作者 韩益亮 岳泽轮 +1 位作者 杨晓元 魏悦川 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第11期47-51,共5页
在Simple Matrix方案核心映射中三个矩阵的基础上,加入一个随机抽取的矩阵,从而改进其核心映射构造方法.基于改进的核心映射方法构造了一个多变量加密方案.与原方案相比,本方案的明文数据处理效率提高了34%;在参数选取适当的情况下,可... 在Simple Matrix方案核心映射中三个矩阵的基础上,加入一个随机抽取的矩阵,从而改进其核心映射构造方法.基于改进的核心映射方法构造了一个多变量加密方案.与原方案相比,本方案的明文数据处理效率提高了34%;在参数选取适当的情况下,可以抵抗高阶线性化方程攻击、代数攻击等常见攻击,同时其安全性在标准模型下可归约为有限域上多变量方程组求解的困难问题.分析结果表明:所提出的方案在保持了与Simple Matrix相同安全性的情况下,有效地提高了数据处理效率,是可以抵抗量子攻击的实用加密方案. 展开更多
关键词 密码学 网络安全 多变量公钥密码 标准模型 选择明文攻击
原文传递
Cryptanalysis of dragon scheme
10
作者 YUAN Feng HU Yu-pu +1 位作者 WANG Yan OU Hai-wen 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第4期80-87,共8页
Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an ... Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an algebraic method to attack the candidate dragon signature algorithm. The attack borrows the basic idea of the attack due to Kipnis and Shamir, and utilizes the underlying algebraic structure of the candidate dragon signature algorithm over the extension field to derive a way to enable the variable Y be viewed as a fixed value. The attack recovers the private keys efficiently when the parameters are n≤2s and D=[logq^d]≤3. 展开更多
关键词 cryptography public key cryptography POLYNOMIALS mapping multivariate dragon scheme algebraic method CRYPTANALYSIS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部