Skip to main content

2018 | OriginalPaper | Buchkapitel

Multivariate Encryption Schemes Based on the Constrained MQ Problem

verfasst von : Takanori Yasuda

Erschienen in: Provable Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The MQ problem is mathematical in nature and is related to the security of Multivariate Public Key Cryptography (MPKC). In this paper, we introduce the constrained MQ problem, which is a new mathematical problem derived from the MQ problem. We also propose an encryption scheme construction method in MPKC, the pq-method, whose security is mainly based on the difficulty of solving the constrained MQ problem. We analyze the difficulty level of solving the constrained MQ problem, including different approach from the usual for solving the MQ problem. Furthermore, based on the analysis of the constrained MQ problem, we present secure parameters for the pq-method, and implement the practical schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bettale, L., Faugère, J.-C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. J. Math. Cryptol. 3(3), 177–197 (2009)MathSciNetCrossRef Bettale, L., Faugère, J.-C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. J. Math. Cryptol. 3(3), 177–197 (2009)MathSciNetCrossRef
2.
Zurück zum Zitat Bertsekas, D.P.: Nonlinear Programming, 3rd edn. Athena Scientific, Belmont (2016)MATH Bertsekas, D.P.: Nonlinear Programming, 3rd edn. Athena Scientific, Belmont (2016)MATH
6.
Zurück zum Zitat Coppersmith, D., Stern, J., Vaudenay, S.: The security of the birational permutation signature schemes. J. Cryptogr. 10(3), 207–221 (1997)MathSciNetCrossRef Coppersmith, D., Stern, J., Vaudenay, S.: The security of the birational permutation signature schemes. J. Cryptogr. 10(3), 207–221 (1997)MathSciNetCrossRef
8.
Zurück zum Zitat Ding, J., Schmidt, D.: The new implementation schemes of the TTM cryptosystem are not secure. Progress Comput. Sci. Appl. Log. 23, 113–127 (2004)MathSciNetMATH Ding, J., Schmidt, D.: The new implementation schemes of the TTM cryptosystem are not secure. Progress Comput. Sci. Appl. Log. 23, 113–127 (2004)MathSciNetMATH
9.
Zurück zum Zitat Faugère, J.-C.: A new efficient algorithm for computing Gröbner bases (F4). J. Pure Appl. Algebra 139, 61–88 (1999)MathSciNetCrossRef Faugère, J.-C.: A new efficient algorithm for computing Gröbner bases (F4). J. Pure Appl. Algebra 139, 61–88 (1999)MathSciNetCrossRef
10.
Zurück zum Zitat Faugère, J.-C.: A new efficient algorithm for computing Gröbner bases without reduction to zero (F5). In: Proceedings of ISSAC 2002, pp. 75–83. ACM Press (2002) Faugère, J.-C.: A new efficient algorithm for computing Gröbner bases without reduction to zero (F5). In: Proceedings of ISSAC 2002, pp. 75–83. ACM Press (2002)
12.
Zurück zum Zitat Fröberg, R.: An inequality for Hilbert series of graded algebras. Mathematica Scandinavica 56, 117–144 (1985)MathSciNetCrossRef Fröberg, R.: An inequality for Hilbert series of graded algebras. Mathematica Scandinavica 56, 117–144 (1985)MathSciNetCrossRef
14.
Zurück zum Zitat Hassegawa, S., Kaneko, T.: An attacking method for a public key cryptosystem based on the difficulty of solving a system of non-linear equations. In: Proceedings of 10th SITA, JA5-3 (1987). (in Japanese) Hassegawa, S., Kaneko, T.: An attacking method for a public key cryptosystem based on the difficulty of solving a system of non-linear equations. In: Proceedings of 10th SITA, JA5-3 (1987). (in Japanese)
16.
Zurück zum Zitat Kanzowa, C., Yamashita, N., Fukushima, M.: Levenberg-Marquardt methods with strong local convergence properties for solving nonlinear equations with convex constraints. J. Comput. Appl. Math. 172(2), 375–397 (2004)MathSciNetCrossRef Kanzowa, C., Yamashita, N., Fukushima, M.: Levenberg-Marquardt methods with strong local convergence properties for solving nonlinear equations with convex constraints. J. Comput. Appl. Math. 172(2), 375–397 (2004)MathSciNetCrossRef
19.
Zurück zum Zitat Moh, T.-T.: A fast public key system with signature and master key functions. Commun. Algebra 27(5), 2207–2222 (1999)MathSciNetCrossRef Moh, T.-T.: A fast public key system with signature and master key functions. Commun. Algebra 27(5), 2207–2222 (1999)MathSciNetCrossRef
20.
Zurück zum Zitat Moh, T.-T.: A fast public key system with signature and master Key functions. In: Proceedings of CrypTEC 1999, pp. 63–69 (1999) Moh, T.-T.: A fast public key system with signature and master Key functions. In: Proceedings of CrypTEC 1999, pp. 63–69 (1999)
24.
Zurück zum Zitat Okamoto, E., Nakamura, K.: Evaluation of public key cryptosystems proposed recently. In: Proceedings of 1986’s Symposium of Cryptography and Information Security, vol. D1 (1986). (in Japanese) Okamoto, E., Nakamura, K.: Evaluation of public key cryptosystems proposed recently. In: Proceedings of 1986’s Symposium of Cryptography and Information Security, vol. D1 (1986). (in Japanese)
29.
Zurück zum Zitat Tsujii, S., Itoh, T., Fujioka, A., Kurosawa, K., Matsumoto, T.: Public-key cryptosystem based on the difficulty of solving a system of nonlinear equations. IEEE Xplore Electron. Lett. 23(11), 558–560 (1987)CrossRef Tsujii, S., Itoh, T., Fujioka, A., Kurosawa, K., Matsumoto, T.: Public-key cryptosystem based on the difficulty of solving a system of nonlinear equations. IEEE Xplore Electron. Lett. 23(11), 558–560 (1987)CrossRef
Metadaten
Titel
Multivariate Encryption Schemes Based on the Constrained MQ Problem
verfasst von
Takanori Yasuda
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-01446-9_8