ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "dea4f938-7744-4a2c-83a4-75f2cebe40d8"}, "_deposit": {"id": "2008851", "owners": [1], "pid": {"revision_id": 0, "type": "depid", "value": "2008851"}, "status": "published"}, "_oai": {"id": "oai:u-ryukyu.repo.nii.ac.jp:02008851", "sets": ["1642838338003", "1642838406414"]}, "author_link": [], "item_1617186331708": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field", "subitem_1551255648112": "en"}]}, "item_1617186419668": {"attribute_name": "Creator", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Hashimoto, Yasufumi", "creatorNameLang": "en"}]}]}, "item_1617186476635": {"attribute_name": "Access Rights", "attribute_value_mlt": [{"subitem_1522299639480": "open access", "subitem_1600958577026": "http://purl.org/coar/access_right/c_abf2"}]}, "item_1617186499011": {"attribute_name": "Rights", "attribute_value_mlt": [{"subitem_1522650717957": "en", "subitem_1522651041219": "IEICE"}, {"subitem_1522650717957": "en", "subitem_1522650727486": "http://www.ieice.org/jpn/", "subitem_1522651041219": "http://www.ieice.org/jpn/"}]}, "item_1617186609386": {"attribute_name": "Subject", "attribute_value_mlt": [{"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "multivariate public-key cryptosystems (MPKC)"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "post-quantum cryptography"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "extension field"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "quadratic forms"}]}, "item_1617186626617": {"attribute_name": "Description", "attribute_value_mlt": [{"subitem_description": "One of major ideas to design a multivariate public key cryptosystem (MPKC) is to generate its quadratic forms by a polynomial map over an extension field. In fact, Matsumoto-Imai\u0027s scheme (1988), HFE (Patarin, 1996), MFE (Wang et al., 2006) and multi-HFE (Chen et al., 2008) are constructed in this way and Sflash (Akkar et al., 2003), Quartz (Patarin et al., 2001), Gui (Petzoldt et al, 2015) are variants of these schemes. An advantage of such extension field type MPKCs is to reduce the numbers of variables and equations to be solved in the decryption process. In the present paper, we study the security of MPKCs whose quadratic forms are derived from a \u201cquadratic\u201d map over an extension field and propose a new attack on such MPKCs. Our attack recovers partial information of the secret affine maps in polynomial time when the field is of odd characteristic. Once such partial information is recovered, the attacker can find the plain-text for a given cipher-text by solving a system of quadratic equations over the extension field whose numbers of variables and equations are same to those of the system of quadratic equations used in the decryption process.", "subitem_description_type": "Other"}, {"subitem_description": "\u8ad6\u6587", "subitem_description_type": "Other"}]}, "item_1617186643794": {"attribute_name": "Publisher", "attribute_value_mlt": [{"subitem_1522300295150": "en", "subitem_1522300316516": "The Institute of Electronics, Information and Communication Engineers"}, {"subitem_1522300295150": "ja", "subitem_1522300316516": "\u4e00\u822c\u793e\u56e3\u6cd5\u4eba \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a"}]}, "item_1617186702042": {"attribute_name": "Language", "attribute_value_mlt": [{"subitem_1551255818386": "eng"}]}, "item_1617186783814": {"attribute_name": "Identifier", "attribute_value_mlt": [{"subitem_identifier_type": "HDL", "subitem_identifier_uri": "http://hdl.handle.net/20.500.12000/37650"}]}, "item_1617186920753": {"attribute_name": "Source Identifier", "attribute_value_mlt": [{"subitem_1522646500366": "ISSN", "subitem_1522646572813": "0916-8508"}, {"subitem_1522646500366": "ISSN", "subitem_1522646572813": "1745-1337"}, {"subitem_1522646500366": "NCID", "subitem_1522646572813": "AA10826239"}]}, "item_1617186941041": {"attribute_name": "Source Title", "attribute_value_mlt": [{"subitem_1522650068558": "en", "subitem_1522650091861": "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"}]}, "item_1617187056579": {"attribute_name": "Bibliographic Information", "attribute_value_mlt": [{"bibliographicIssueNumber": "1", "bibliographicPageEnd": "25", "bibliographicPageStart": "18", "bibliographicVolumeNumber": "E-100"}]}, "item_1617258105262": {"attribute_name": "Resource Type", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_1617265215918": {"attribute_name": "Version Type", "attribute_value_mlt": [{"subitem_1522305645492": "VoR", "subitem_1600292170262": "http://purl.org/coar/version/c_970fb48d4fbd8a85"}]}, "item_1617353299429": {"attribute_name": "Relation", "attribute_value_mlt": [{"subitem_1522306287251": {"subitem_1522306382014": "DOI", "subitem_1522306436033": "http://dx.doi.org/10.1587/transfun.E100.A.18"}}, {"subitem_1522306287251": {"subitem_1522306382014": "DOI", "subitem_1522306436033": "info:doi/10.1587/transfun.E100.A.18"}}]}, "item_1617605131499": {"attribute_name": "File", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "download_preview_message": "", "file_order": 0, "filename": "VolE100-Ano1p18.pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "", "size": 0, "url": {"objectType": "fulltext", "url": "https://u-ryukyu.repo.nii.ac.jp/record/2008851/files/VolE100-Ano1p18.pdf"}, "version_id": "f241b29a-9731-4a67-ad68-eeb9ad033158"}]}, "item_title": "Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field", "item_type_id": "15", "owner": "1", "path": ["1642838338003", "1642838406414"], "permalink_uri": "http://hdl.handle.net/20.500.12000/37650", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2018-02-05"}, "publish_date": "2018-02-05", "publish_status": "0", "recid": "2008851", "relation": {}, "relation_version_is_last": true, "title": ["Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field"], "weko_shared_id": -1}
  1. 学術雑誌論文
  2. その他
  1. 部局別インデックス
  2. 理学部

Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field

http://hdl.handle.net/20.500.12000/37650
http://hdl.handle.net/20.500.12000/37650
133aea78-c3d6-423c-aa4e-4693c295aed9
名前 / ファイル ライセンス アクション
VolE100-Ano1p18.pdf VolE100-Ano1p18.pdf
Item type デフォルトアイテムタイプ(フル)(1)
公開日 2018-02-05
タイトル
タイトル Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field
言語 en
作成者 Hashimoto, Yasufumi

× Hashimoto, Yasufumi

en Hashimoto, Yasufumi

アクセス権
アクセス権 open access
アクセス権URI http://purl.org/coar/access_right/c_abf2
権利情報
言語 en
権利情報 IEICE
言語 en
権利情報Resource http://www.ieice.org/jpn/
権利情報 http://www.ieice.org/jpn/
主題
言語 en
主題Scheme Other
主題 multivariate public-key cryptosystems (MPKC)
言語 en
主題Scheme Other
主題 post-quantum cryptography
言語 en
主題Scheme Other
主題 extension field
言語 en
主題Scheme Other
主題 quadratic forms
内容記述
内容記述タイプ Other
内容記述 One of major ideas to design a multivariate public key cryptosystem (MPKC) is to generate its quadratic forms by a polynomial map over an extension field. In fact, Matsumoto-Imai's scheme (1988), HFE (Patarin, 1996), MFE (Wang et al., 2006) and multi-HFE (Chen et al., 2008) are constructed in this way and Sflash (Akkar et al., 2003), Quartz (Patarin et al., 2001), Gui (Petzoldt et al, 2015) are variants of these schemes. An advantage of such extension field type MPKCs is to reduce the numbers of variables and equations to be solved in the decryption process. In the present paper, we study the security of MPKCs whose quadratic forms are derived from a “quadratic” map over an extension field and propose a new attack on such MPKCs. Our attack recovers partial information of the secret affine maps in polynomial time when the field is of odd characteristic. Once such partial information is recovered, the attacker can find the plain-text for a given cipher-text by solving a system of quadratic equations over the extension field whose numbers of variables and equations are same to those of the system of quadratic equations used in the decryption process.
内容記述タイプ Other
内容記述 論文
出版者
言語 ja
出版者 一般社団法人 電子情報通信学会
言語
言語 eng
資源タイプ
資源タイプ journal article
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
識別子
識別子 http://hdl.handle.net/20.500.12000/37650
識別子タイプ HDL
関連情報
関連識別子
識別子タイプ DOI
関連識別子 http://dx.doi.org/10.1587/transfun.E100.A.18
関連識別子
識別子タイプ DOI
関連識別子 info:doi/10.1587/transfun.E100.A.18
収録物識別子
収録物識別子タイプ ISSN
収録物識別子 0916-8508
収録物識別子タイプ ISSN
収録物識別子 1745-1337
収録物識別子タイプ NCID
収録物識別子 AA10826239
収録物名
言語 en
収録物名 IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
書誌情報
巻 E-100, 号 1, p. 18-25
戻る
0
views
See details
Views

Versions

Ver.1 2022-01-28 07:18:58.057703
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON

確認


Powered by WEKO3


Powered by WEKO3