词条 | Multivariate cryptography |
释义 |
Multivariate cryptography is the generic term for asymmetric cryptographic primitives based on multivariate polynomials over a finite field . In certain cases those polynomials could be defined over both a ground and an extension field. If the polynomials have the degree two, we talk about multivariate quadratics. Solving systems of multivariate polynomial equations is proven to be NP-hard or NP-complete. That's why those schemes are often considered to be good candidates for post-quantum cryptography. Multivariate cryptography has been very productive in terms of design and cryptanalysis. Overall, the situation is now more stable and the strongest schemes have withstood the test of time. It is commonly admitted that Multivariate cryptography turned out to be more successful as an approach to build signature schemes primarily because multivariate schemes provide the shortest signature among post-quantum algorithms. HistoryIn 1988, T. Matsumoto and H. Imai [MI88] presented their so-called C* scheme at the Eurocrypt conference. Although C* has been broken [P95], the general principle of Matsumoto and Imai has inspired a generation of improved proposals. In later work, the "Hidden Monomial Cryptosystems" was developed by {{fr}} Jacques Patarin. It is based on a ground and an extension field. "Hidden Field Equations" (HFE), developed by {{fr}} Jacques Patarin in 1996, remains a popular multivariate scheme today [P96]. The security of HFE has been thoroughly investigated, beginning with a direct Gröbner basis attack [FJ03, GJS06], key-recovery attacks [KS99b, BFP13], and more. The plain version of HFE is considered to be practically broken, in the sense that secure parameters lead to an impractical scheme. However, some simple variants of HFE, such as the minus variant and the vinegar variant allow one to strengthen the basic HFE against all known attacks. In addition to HFE, J. Patarin developed other schemes. In 1997 he presented “Balanced Oil & Vinegar” and 1999 “Unbalanced Oil and Vinegar” in cooperation with Aviad Kipnis and Louis Goubin [KS99a]. ConstructionMultivariate Quadratics involves a public and a private key. The private key consists of two affine transformations, S and T, and an easy to invert quadratic map P’ . We denote the by matrix of the affine endomorphisms by and the shift vector by and similarly for . In other words,
The triple is the private key, also known as the trapdoor. The public key is the composition which is by assumption hard to invert without the knowledge of the trapdoor. SignatureSignatures are generated using the private key and are verified using the public key as follows. The message is hashed to a vector in via a known hash function. The signature is . The receiver of the signed document must have the public key P in possession. He computes the hash y and checks that the signature x fulfils . Applications{{Unreferenced section|date=August 2018}}
References
Multivariate Quadratic equations; Current Version: 2005-12-15
External links
2 : Multivariate cryptography|Post-quantum cryptography |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。