bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round
文献类型:期刊论文
作者 | Zhao X. ; Feng D. |
刊名 | IET Information Security
![]() |
出版日期 | 2010 |
卷号 | 4期号:3页码:167-184 |
关键词 | multivariate public key cryptosystem quadratic rounds security improvement two-round scheme public key cryptography |
ISSN号 | 17518709 |
学科主题 | Computer Science, Information Systems; Computer Science, Theory & Methods |
收录类别 | EI,IEEE,SCI |
语种 | 英语 |
WOS记录号 | WOS:000284134100006 |
公开日期 | 2011-05-23 |
附注 | It was reported that a multivariate public key cryptosystem (MPKC) could be strengthened if its public key is generated by composition of two original public keys. In fact, two existing keys are used to constitute two quadratic rounds of the new key. But such a two-round scheme, called 2R, was claimed to have been decomposed, and even a further improved 2R, named 2R-, was shown to be similarly vulnerable. The result casts doubts on the principle of using a two-round structure to improve the security. However, this study clearly states that the decomposition attacks depend on the prerequisite that either of the rounds is quadratic. It shows that these attacks, even the conceivable extended ones, do not work in theory or in practice if the first round is of higher degree, although the threat still remains when only the degree of the second round is changed. Therefore adopting a cubic first round becomes a rule in the design of the 2-round schemes. The analysis and experiments in this study also demonstrate that the new schemes with such an indecomposable two-round public key can provide the desired security against many other known and potential attacks on MPKCs and that the key size can be practically controlled. © 2010 The Institution of Engineering and Technology. |
源URL | [http://124.16.136.157/handle/311060/9680] ![]() |
专题 | 软件研究所_软件所图书馆_期刊论文 |
推荐引用方式 GB/T 7714 | Zhao X.,Feng D.. bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round[J]. IET Information Security,2010,4(3):167-184. |
APA | Zhao X.,&Feng D..(2010).bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round.IET Information Security,4(3),167-184. |
MLA | Zhao X.,et al."bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round".IET Information Security 4.3(2010):167-184. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。