全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

多变量代数理论及其在密码学中的应用

Keywords: 密码学,多变量公钥密码,MQ问题,流密码,哈希函数

Full-Text   Cite this paper   Add to My Lib

Abstract:

介绍了有限域上二次多变量多项式方程组(MQ问题)求解理论的研究进展;描述了几种主要的MQ公钥密码算法及其相应的分析手段,并归纳出了MQ(multivariatequadratic)公钥密码系统设计所应遵循的基本准则;概括了MQ问题在其他密码学领域(如流密码)中的应用;对MQ密码的研究前景进行了展望,并归纳出了一系列值得研究的开放问题.

References

[1]  MOHTT.A fast public key system with signature and master key functions[C]∥Proceeding of CryTEC 1999.Hongkong:Hongkong City University Press,1999:63-69.
[2]  DING J,HU L,NIE X Y,et al.High order linearization equation(HOLE)attack on multivariate public key cryptosystems[C]∥Proceedings of PKC 2007.Berlin:Springer-Verlag,2007:233-248.
[3]  WANG X Y.YU H.How to break MD5 and other hash functions[C]∥Proceedings of Eurocrypt 2005.Berlin:Springer-Verlag,2005:19-35.
[4]  WANG X Y,YAO A,YAO F.Cryptanalysis of SHA-1 hash function[C]∥Proceedings of Crypto 2005.Berlin:Sringer-Verlag,2005:17-36.
[5]  BILLETO,ROBSHAW,PEYRIN T.On building hash functions from multivariate quadratic equations[C]∥Proceedings ofACISP 2007.Berlin:Springer-Verlag,2007:82-95.
[6]  DING J,YANG B Y.Multivariates polynomials for hashing[C]∥Proceeding of Inscrypt 2007.Berlin:Springer-Verlag,2007:308-371.
[7]  AUMASSON J,MEIER W.Analysis of multivariate hash functions[C]∥Proceedings of ICISC 2007.Berlin:Springer-Verlag,2007:309-323.
[8]  BERBAIN C,GILLBERTH,PATARIN J.QUAD:A practical stream cipher with provable security[C]∥Proceedings ofEurocrypt 2006.Berlin:Springer-Verlag,2006:109-128.
[9]  YANG B Y,BERNSTEIN D J,CHEN J M.Analysis of QUAD[C]∥Proceedings of FSE 2007.Berlin:Springer-Verlag,2007:290-308.
[10]  BERBAIN C.QUAD:Amultivariate stream cipher with provable security[J].Journal of Symbolic Computation,2009(12):1703-1723.
[11]  DING J T,WOLF C,YANG B Y.l-invertible cycles for multivariate quadratic public key cryptography[C]∥Proceedings ofPKC 2007.Berlin:Springer-Verlag,2007:266-281.
[12]  唐樨瑾,冯勇.Dixon结式在密码学中的应用[J].软件学报,2007,18(7):1738-1745.TANG Xi-jin,FENG Yong.Applying Dixon resultants in cryptography[J].Journal of Software,2007,18(7):1738-1745.(in Chinese)
[13]  管海明.公钥密码如何应对量子计算的挑战[J].信息安全与通信保密,2007,8(8):35-54.GUAN Hai-ming.How public key cryptosystem confronts the challenge from quantum computing[J].Information Securityand Communications Privacy,2007,8(8):35-54.(in Chinese)
[14]  陈辉焱,王连强,吕述望.关于HFE密码系统的密钥问题研究[J].计算机研究与发展,2007,44(7):1205-1210.CHEN Hui-yan,WANG Lian-qiang,L Shu-wang.A study of key problems of HFE cryptosystem[J].Journal of ComputerResearch and Development,2007,44(7):1205-1210.(in Chinese)
[15]  SHOR P W.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J].SIAM JComputer,1997(5):1484-1509.
[16]  DING J T.Multivariate public key cryptosystems[M].Berlin:Springer-Verlag,2006:1-10.
[17]  GAREY M,JOHNSOND.Computers and intractability,a guide to the theory of NP-completeness[M].NewYork:Freeman,1979:128-130.
[18]  PATARIN J,GOUBIN J.Trapdoor one-way permutati-ons and multivariate polynomials[C]∥Proceedings of ICISC 1997.Berlin:Springer-Verlag,1997:356-368.
[19]  PATARIN J.Hidden field equations(HFE)and isomorphisms of polynomials(IP):two new families of asymmetricalgorithms[C]∥Proceedings of Eurocrypt 1996.Berlin:Springer-Verlag,1996:33-48.
[20]  FAUGERE J C.A new efficient algorithm for computing Gr bner bases without reduction to zero(F5)[C]∥Proceedings ofISSAC2002.New York:ACM Press,2002:75-83.
[21]  FAUGERE J C,JOUX A.Algebraic cryptanalysis of hidden field equations(HFE)using Gr bner bases[C]∥Proceedings ofCrypto 2003.Berlin:Springer-Verlag,2003:44-60.
[22]  COURTOIS N T,KLIMOV A,PATARIN J,et al.Efficient algorithms for solving overdefined systems of multivar-iatepolynomial equations[C]∥Proceedings of Eurocrypt 2000.Berlin:Springer-Verlag,2000:392-407.
[23]  COURTOIS N,PIEPRZYK J.Cryptanalysis of block ciphers with overdefined systems of equations[C]∥Proceedings ofAsiacrypt 2002.Berlin:Springer-Verlag,2002:267-287.
[24]  COURTOIS N,GOUBIN L,MEIER W,et al.Solving underdefined systems of multivariate quadratic equations[C]∥Proceedings of PKC 2002.Berlin:Springer-Verlag,2002:211-227.
[25]  MATSUMOTO T,IMAI H.Public quadratic polynomial-tuples for efficient signature verification and message encryption[C]∥Proceedings of Eurocryp 1988.Berlin:Springer-Verlag,1988:419-453.
[26]  PATARIN J.Cryptanalysis of the matsumoto and imai public key scheme of eurocrypt1988[C]∥Proceedings of Crypto1995.Berlin:Springer-Verlag,1995:248-261.
[27]  AKKAR M,COURTIOS N.A fast and secure implementation of SFLASH[C]∥Proceedings of PKC 2003.Berlin:Springer-Verlag,2003:267-278.
[28]  DUBOIS V,FOUQUE P A,SHAMIR A,et al.Practical cryptanalysis of SFLASH[C]∥Proceedings of Crypto 2007.Berlin:Springer-Verlag,2007:1-12.
[29]  DING J,GOWER J.Inoculating multivariate schemes against differential attacks[C]∥Proceedings of PKC 2006.Berlin:Springer-Verlag,2006:290-301.
[30]  PATARIN J,COURTOIS N,GOUBIN L.QUARTZ,128-bit long digital signatures[C]∥Proceedings of CT-RSA 2001.Berlin:Springer-Verlag,2001:298-307.
[31]  DING J,SCHMIDTD.Cryptanalysis of HFEVand the internal perturbation of HFE[C]∥Proceedings of PKC 2005.Berlin:Springer-Verlag,2005:288-301.
[32]  DING J.Multivariate public key cryptosystems[M].Berlin:Sringer-Verlag,2006:64-68.
[33]  KIPNIS A,PARARIN J,GOUBIN L.Unbalanced oil and vinegar signature schemes[C]∥Proceedings of Eurocrypt 1999.Berlin:Springer-Verlag,1999:206-222.
[34]  DING J,SCHMIDTD.Rainbow,a newmultivariate public key signature scheme[C]∥Proceedings of ACNS 2005.Berlin:Springer-Verlag,2005:164-175.
[35]  KIPNIS A,SHAMIR A.Cryptanalysis of the oil&vinegar signature scheme[C]∥Proceedings of Crypto 1998.Berlin:Springer-Verlag,1998:257-267.
[36]  FELL H,DIFFIE W.Analysis of public key approach based on polynomial substitution[C]∥Proceedings of Crypto 1985.Berlin:Springer-Verlag,1985:340-349.
[37]  SHAMIR A.Efficient signature schemes based on birational permutations[C]∥Proceedings of Crypto 1993.Berlin:Springer-Verlag,1993:1-12.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133