中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round

文献类型:期刊论文

作者Zhao X. ; Feng D.
刊名IET Information Security
出版日期2010
卷号4期号:3页码:167-184
关键词multivariate public key cryptosystem quadratic rounds security improvement two-round scheme public key cryptography
ISSN号17518709
学科主题Computer Science, Information Systems; Computer Science, Theory & Methods
收录类别EI,IEEE,SCI
语种英语
WOS记录号WOS:000284134100006
公开日期2011-05-23
附注It was reported that a multivariate public key cryptosystem (MPKC) could be strengthened if its public key is generated by composition of two original public keys. In fact, two existing keys are used to constitute two quadratic rounds of the new key. But such a two-round scheme, called 2R, was claimed to have been decomposed, and even a further improved 2R, named 2R-, was shown to be similarly vulnerable. The result casts doubts on the principle of using a two-round structure to improve the security. However, this study clearly states that the decomposition attacks depend on the prerequisite that either of the rounds is quadratic. It shows that these attacks, even the conceivable extended ones, do not work in theory or in practice if the first round is of higher degree, although the threat still remains when only the degree of the second round is changed. Therefore adopting a cubic first round becomes a rule in the design of the 2-round schemes. The analysis and experiments in this study also demonstrate that the new schemes with such an indecomposable two-round public key can provide the desired security against many other known and potential attacks on MPKCs and that the key size can be practically controlled. © 2010 The Institution of Engineering and Technology.
源URL[http://124.16.136.157/handle/311060/9680]  
专题软件研究所_软件所图书馆_期刊论文
推荐引用方式
GB/T 7714
Zhao X.,Feng D.. bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round[J]. IET Information Security,2010,4(3):167-184.
APA Zhao X.,&Feng D..(2010).bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round.IET Information Security,4(3),167-184.
MLA Zhao X.,et al."bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round".IET Information Security 4.3(2010):167-184.

入库方式: OAI收割

来源:软件研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。