{"created":"2022-01-28T07:18:54.501917+00:00","id":2008851,"links":{},"metadata":{"_buckets":{"deposit":"4e7db802-3ade-427c-a843-8198efddcdd0"},"_deposit":{"id":"2008851","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"2008851"},"status":"published"},"_oai":{"id":"oai:u-ryukyu.repo.nii.ac.jp:02008851","sets":["1642838163960:1642838338003","1642838403551:1642838406414"]},"author_link":[],"control_number":"2008851","item_1617186331708":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_title":"Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field","subitem_title_language":"en"}]},"item_1617186419668":{"attribute_name":"Creator","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hashimoto, Yasufumi","creatorNameLang":"en"}]}]},"item_1617186476635":{"attribute_name":"Access Rights","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_1617186499011":{"attribute_name":"Rights","attribute_value_mlt":[{"subitem_rights":"IEICE","subitem_rights_language":"en"},{"subitem_rights":"http://www.ieice.org/jpn/","subitem_rights_language":"en","subitem_rights_resource":"http://www.ieice.org/jpn/"}]},"item_1617186609386":{"attribute_name":"Subject","attribute_value_mlt":[{"subitem_subject":"multivariate public-key cryptosystems (MPKC)","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"post-quantum cryptography","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"extension field","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"quadratic forms","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_1617186626617":{"attribute_name":"Description","attribute_value_mlt":[{"subitem_description":"One of major ideas to design a multivariate public key cryptosystem (MPKC) is to generate its quadratic forms by a polynomial map over an extension field. In fact, Matsumoto-Imai's scheme (1988), HFE (Patarin, 1996), MFE (Wang et al., 2006) and multi-HFE (Chen et al., 2008) are constructed in this way and Sflash (Akkar et al., 2003), Quartz (Patarin et al., 2001), Gui (Petzoldt et al, 2015) are variants of these schemes. An advantage of such extension field type MPKCs is to reduce the numbers of variables and equations to be solved in the decryption process. In the present paper, we study the security of MPKCs whose quadratic forms are derived from a “quadratic” map over an extension field and propose a new attack on such MPKCs. Our attack recovers partial information of the secret affine maps in polynomial time when the field is of odd characteristic. Once such partial information is recovered, the attacker can find the plain-text for a given cipher-text by solving a system of quadratic equations over the extension field whose numbers of variables and equations are same to those of the system of quadratic equations used in the decryption process.","subitem_description_type":"Other"},{"subitem_description":"論文","subitem_description_type":"Other"}]},"item_1617186643794":{"attribute_name":"Publisher","attribute_value_mlt":[{"subitem_publisher":"The Institute of Electronics, Information and Communication Engineers","subitem_publisher_language":"en"},{"subitem_publisher":"一般社団法人 電子情報通信学会","subitem_publisher_language":"ja"}]},"item_1617186702042":{"attribute_name":"Language","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_1617186783814":{"attribute_name":"Identifier","attribute_value_mlt":[{"subitem_identifier_type":"HDL","subitem_identifier_uri":"http://hdl.handle.net/20.500.12000/37650"}]},"item_1617186920753":{"attribute_name":"Source Identifier","attribute_value_mlt":[{"subitem_source_identifier":"0916-8508","subitem_source_identifier_type":"EISSN"},{"subitem_source_identifier":"1745-1337","subitem_source_identifier_type":"EISSN"},{"subitem_source_identifier":"AA10826239","subitem_source_identifier_type":"NCID"}]},"item_1617186941041":{"attribute_name":"Source Title","attribute_value_mlt":[{"subitem_source_title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","subitem_source_title_language":"en"}]},"item_1617187056579":{"attribute_name":"Bibliographic Information","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2017-01-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicPageEnd":"25","bibliographicPageStart":"18","bibliographicVolumeNumber":"E-100"}]},"item_1617258105262":{"attribute_name":"Resource Type","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_1617265215918":{"attribute_name":"Version Type","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_1617353299429":{"attribute_name":"Relation","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://dx.doi.org/10.1587/transfun.E100.A.18","subitem_relation_type_select":"DOI"}},{"subitem_relation_type_id":{"subitem_relation_type_id_text":"info:doi/10.1587/transfun.E100.A.18","subitem_relation_type_select":"DOI"}}]},"item_1617605131499":{"attribute_name":"File","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","filename":"VolE100-Ano1p18.pdf","mimetype":"application/pdf","url":{"objectType":"fulltext","url":"https://u-ryukyu.repo.nii.ac.jp/record/2008851/files/VolE100-Ano1p18.pdf"},"version_id":"ddcf360c-51e6-41c2-8214-6470bf71c5e7"}]},"item_title":"Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field","item_type_id":"15","owner":"1","path":["1642838338003","1642838406414"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2018-02-05"},"publish_date":"2018-02-05","publish_status":"0","recid":"2008851","relation_version_is_last":true,"title":["Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2023-08-03T05:37:55.531663+00:00"}