WEKO3
アイテム
{"_buckets": {"deposit": "4e7db802-3ade-427c-a843-8198efddcdd0"}, "_deposit": {"id": "2008851", "owners": [1], "pid": {"revision_id": 0, "type": "depid", "value": "2008851"}, "status": "published"}, "_oai": {"id": "oai:u-ryukyu.repo.nii.ac.jp:02008851", "sets": ["1642838338003", "1642838406414"]}, "author_link": [], "control_number": "2008851", "item_1617186331708": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field", "subitem_1551255648112": "en"}]}, "item_1617186419668": {"attribute_name": "Creator", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Hashimoto, Yasufumi", "creatorNameLang": "en"}]}]}, "item_1617186476635": {"attribute_name": "Access Rights", "attribute_value_mlt": [{"subitem_1522299639480": "open access", "subitem_1600958577026": "http://purl.org/coar/access_right/c_abf2"}]}, "item_1617186499011": {"attribute_name": "Rights", "attribute_value_mlt": [{"subitem_1522650717957": "en", "subitem_1522651041219": "IEICE"}, {"subitem_1522650717957": "en", "subitem_1522650727486": "http://www.ieice.org/jpn/", "subitem_1522651041219": "http://www.ieice.org/jpn/"}]}, "item_1617186609386": {"attribute_name": "Subject", "attribute_value_mlt": [{"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "multivariate public-key cryptosystems (MPKC)"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "post-quantum cryptography"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "extension field"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "quadratic forms"}]}, "item_1617186626617": {"attribute_name": "Description", "attribute_value_mlt": [{"subitem_description": "One of major ideas to design a multivariate public key cryptosystem (MPKC) is to generate its quadratic forms by a polynomial map over an extension field. In fact, Matsumoto-Imai\u0027s scheme (1988), HFE (Patarin, 1996), MFE (Wang et al., 2006) and multi-HFE (Chen et al., 2008) are constructed in this way and Sflash (Akkar et al., 2003), Quartz (Patarin et al., 2001), Gui (Petzoldt et al, 2015) are variants of these schemes. An advantage of such extension field type MPKCs is to reduce the numbers of variables and equations to be solved in the decryption process. In the present paper, we study the security of MPKCs whose quadratic forms are derived from a “quadratic” map over an extension field and propose a new attack on such MPKCs. Our attack recovers partial information of the secret affine maps in polynomial time when the field is of odd characteristic. Once such partial information is recovered, the attacker can find the plain-text for a given cipher-text by solving a system of quadratic equations over the extension field whose numbers of variables and equations are same to those of the system of quadratic equations used in the decryption process.", "subitem_description_type": "Other"}, {"subitem_description": "論文", "subitem_description_type": "Other"}]}, "item_1617186643794": {"attribute_name": "Publisher", "attribute_value_mlt": [{"subitem_1522300295150": "en", "subitem_1522300316516": "The Institute of Electronics, Information and Communication Engineers"}, {"subitem_1522300295150": "ja", "subitem_1522300316516": "一般社団法人 電子情報通信学会"}]}, "item_1617186702042": {"attribute_name": "Language", "attribute_value_mlt": [{"subitem_1551255818386": "eng"}]}, "item_1617186783814": {"attribute_name": "Identifier", "attribute_value_mlt": [{"subitem_identifier_type": "HDL", "subitem_identifier_uri": "http://hdl.handle.net/20.500.12000/37650"}]}, "item_1617186920753": {"attribute_name": "Source Identifier", "attribute_value_mlt": [{"subitem_1522646500366": "EISSN", "subitem_1522646572813": "0916-8508"}, {"subitem_1522646500366": "EISSN", "subitem_1522646572813": "1745-1337"}, {"subitem_1522646500366": "NCID", "subitem_1522646572813": "AA10826239"}]}, "item_1617186941041": {"attribute_name": "Source Title", "attribute_value_mlt": [{"subitem_1522650068558": "en", "subitem_1522650091861": "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"}]}, "item_1617187056579": {"attribute_name": "Bibliographic Information", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2017-01-01", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "1", "bibliographicPageEnd": "25", "bibliographicPageStart": "18", "bibliographicVolumeNumber": "E-100"}]}, "item_1617258105262": {"attribute_name": "Resource Type", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_1617265215918": {"attribute_name": "Version Type", "attribute_value_mlt": [{"subitem_1522305645492": "VoR", "subitem_1600292170262": "http://purl.org/coar/version/c_970fb48d4fbd8a85"}]}, "item_1617353299429": {"attribute_name": "Relation", "attribute_value_mlt": [{"subitem_1522306287251": {"subitem_1522306382014": "DOI", "subitem_1522306436033": "https://dx.doi.org/10.1587/transfun.E100.A.18"}}, {"subitem_1522306287251": {"subitem_1522306382014": "DOI", "subitem_1522306436033": "info:doi/10.1587/transfun.E100.A.18"}}]}, "item_1617605131499": {"attribute_name": "File", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "download_preview_message": "", "file_order": 0, "filename": "VolE100-Ano1p18.pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "", "size": 0, "url": {"objectType": "fulltext", "url": "https://u-ryukyu.repo.nii.ac.jp/record/2008851/files/VolE100-Ano1p18.pdf"}, "version_id": "ddcf360c-51e6-41c2-8214-6470bf71c5e7"}]}, "item_title": "Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field", "item_type_id": "15", "owner": "1", "path": ["1642838338003", "1642838406414"], "permalink_uri": "http://hdl.handle.net/20.500.12000/37650", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2018-02-05"}, "publish_date": "2018-02-05", "publish_status": "0", "recid": "2008851", "relation": {}, "relation_version_is_last": true, "title": ["Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field"], "weko_shared_id": -1}
Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field
http://hdl.handle.net/20.500.12000/37650
http://hdl.handle.net/20.500.12000/37650133aea78-c3d6-423c-aa4e-4693c295aed9
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | デフォルトアイテムタイプ(フル)(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2018-02-05 | |||||||
タイトル | ||||||||
タイトル | Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field | |||||||
言語 | en | |||||||
作成者 |
Hashimoto, Yasufumi
× Hashimoto, Yasufumi
|
|||||||
アクセス権 | ||||||||
アクセス権 | open access | |||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||
権利情報 | ||||||||
言語 | en | |||||||
権利情報 | IEICE | |||||||
権利情報 | ||||||||
言語 | en | |||||||
権利情報Resource | http://www.ieice.org/jpn/ | |||||||
権利情報 | http://www.ieice.org/jpn/ | |||||||
主題 | ||||||||
言語 | en | |||||||
主題Scheme | Other | |||||||
主題 | multivariate public-key cryptosystems (MPKC) | |||||||
主題 | ||||||||
言語 | en | |||||||
主題Scheme | Other | |||||||
主題 | post-quantum cryptography | |||||||
主題 | ||||||||
言語 | en | |||||||
主題Scheme | Other | |||||||
主題 | extension field | |||||||
主題 | ||||||||
言語 | en | |||||||
主題Scheme | Other | |||||||
主題 | quadratic forms | |||||||
内容記述 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | One of major ideas to design a multivariate public key cryptosystem (MPKC) is to generate its quadratic forms by a polynomial map over an extension field. In fact, Matsumoto-Imai's scheme (1988), HFE (Patarin, 1996), MFE (Wang et al., 2006) and multi-HFE (Chen et al., 2008) are constructed in this way and Sflash (Akkar et al., 2003), Quartz (Patarin et al., 2001), Gui (Petzoldt et al, 2015) are variants of these schemes. An advantage of such extension field type MPKCs is to reduce the numbers of variables and equations to be solved in the decryption process. In the present paper, we study the security of MPKCs whose quadratic forms are derived from a “quadratic” map over an extension field and propose a new attack on such MPKCs. Our attack recovers partial information of the secret affine maps in polynomial time when the field is of odd characteristic. Once such partial information is recovered, the attacker can find the plain-text for a given cipher-text by solving a system of quadratic equations over the extension field whose numbers of variables and equations are same to those of the system of quadratic equations used in the decryption process. | |||||||
内容記述 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | 論文 | |||||||
出版者 | ||||||||
言語 | en | |||||||
出版者 | The Institute of Electronics, Information and Communication Engineers | |||||||
出版者 | ||||||||
言語 | ja | |||||||
出版者 | 一般社団法人 電子情報通信学会 | |||||||
言語 | ||||||||
言語 | eng | |||||||
資源タイプ | ||||||||
資源タイプ | journal article | |||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||
出版タイプ | ||||||||
出版タイプ | VoR | |||||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |||||||
識別子 | ||||||||
識別子 | http://hdl.handle.net/20.500.12000/37650 | |||||||
識別子タイプ | HDL | |||||||
関連情報 | ||||||||
識別子タイプ | DOI | |||||||
関連識別子 | https://dx.doi.org/10.1587/transfun.E100.A.18 | |||||||
関連情報 | ||||||||
識別子タイプ | DOI | |||||||
関連識別子 | info:doi/10.1587/transfun.E100.A.18 | |||||||
収録物識別子 | ||||||||
収録物識別子タイプ | EISSN | |||||||
収録物識別子 | 0916-8508 | |||||||
収録物識別子 | ||||||||
収録物識別子タイプ | EISSN | |||||||
収録物識別子 | 1745-1337 | |||||||
収録物識別子 | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AA10826239 | |||||||
収録物名 | ||||||||
言語 | en | |||||||
収録物名 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | |||||||
書誌情報 |
巻 E-100, 号 1, p. 18-25, 発行日 2017-01-01 |