Ring signature scheme based on multivariate public key cryptosystems
نویسندگان
چکیده
منابع مشابه
On multivariate signature-only public key cryptosystems
In a paper published at Asiacrypt 2000 a signature scheme that (apparently) cannot be abused for encryption is published. The problem is highly non-trivial and every solution should be looked upon with caution. What is especially hard to achieve is to avoid that the public key should leak some information, to be used as a possible ”shadow” secondary public key. In the present paper we argument ...
متن کاملMultivariate Public Key Cryptosystems
As the title says, this book is about Multivariate cryptography. Besides code-, latticeand hash-based cryptosystems, Multivariate cryptography is one of the main fields of cryptosystems which are believed to be secure against attacks with quantum computers. Multivariate cryptography deals with systems of nonlinear polynomial equations in several variables over a finite field which are difficult...
متن کاملHash-based Multivariate Public Key Cryptosystems
Many efficient attacks have appeared in recent years, which have led to serious blow for the traditional multivariate public key cryptosystems. For example, the signature scheme SFLASH was broken by Dubois et al. at CRYPTO’07, and the Square signature (or encryption) scheme by Billet et al. at ASIACRYPTO’09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes ...
متن کاملA New Multivariate-based Ring Signature Scheme
Most of the existing ring signature schemes are based on traditional cryptography, such as RSA and discrete logarithm. Unfortunately these schemes would be broken if quantum computers emerge. The MQ-problem based PublicKey Cryptosystem (MPKC) is an important alternative to traditional PKCs for its potential to resist future attacks of quantum computers. In this paper, we proposed a new ring sig...
متن کاملConstruction of Extended Multivariate Public Key Cryptosystems
Based on the ideas: “invertible cycle”, “tame transformation” and “special oil and vinegar”, three different nonlinear invertible transformations were constructed separately. Then making use of the idea of the extended multivariate public key cryptosystem, and combining the nonlinear invertible transformations above with Matsumoto-Imai (MI) scheme, three methods of designing extended multivaria...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Mathematics with Applications
سال: 2011
ISSN: 0898-1221
DOI: 10.1016/j.camwa.2011.09.052