期刊文献+

多变量代数理论及其在密码学中的应用 被引量:8

Multivariable Algebra Theory and Its Application in Cryptography
下载PDF
导出
摘要 介绍了有限域上二次多变量多项式方程组(MQ问题)求解理论的研究进展;描述了几种主要的MQ公钥密码算法及其相应的分析手段,并归纳出了MQ(multivariate quadratic)公钥密码系统设计所应遵循的基本准则;概括了MQ问题在其他密码学领域(如流密码)中的应用;对MQ密码的研究前景进行了展望,并归纳出了一系列值得研究的开放问题. The theory of the MQ problem solving is presented in this paper. Then several major MQ public-key cryptography and the corresponding attacks are described in detail, and the basic design principles to be followed of the MQ cryptography are proposed ; After the MQ problem in other cryptography applications (e. g. , stream cipher) are analyzed briefly, the direction and the issues for future research are summarized in the end.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2010年第5期627-634,共8页 Journal of Beijing University of Technology
基金 国家自然科学基金资助项目(60673071 60970115) 中国科学院数学机械化重点实验室开放课题资助项目(KLMM0903)
关键词 密码学 多变量公钥密码 MQ问题 流密码 哈希函数 cryptography MPKC MQ problem stream cipher hash function
  • 相关文献

参考文献37

  • 1SHOR P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[ J]. SIAM J Computer, 1997(5): 1484-1509.
  • 2DING J T. Multivariate public key cryptosystems[ M]. Berlin: Springer-Verlag, 2006: 1-10.
  • 3GAREY M, JOHNSON D. Computers and intractability, a guide to the theory of NP-completeness[ M]. New York: Freeman, 1979: 128-130.
  • 4PATARIN J, GOUBIN J. Trapdoor one-way permutati-ons and multivariate polynomials [ C] // Proceedings of ICISC 1997. Berlin: Springer-Verlag, 1997 : 356-368.
  • 5PATARIN J. Hidden field equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms[ C]//Proceedings of Eurocrypt 1996. Berlin: Springer-Verlag, 1996 : 33-48.
  • 6FAUGERE J C. A new efficient algorithm for computing Grobner bases without reduction to zero (F5) [ C ] //Proceedings of ISSAC2002. New York: ACM Press, 2002: 75-83.
  • 7FAUGERE J C, JOUX A. Algebraic cryptanalysis of hidden field equations (HFE) using Grobner bases[ C]//Proceedings of Crypto 2003. Berlin: Springer-Verlag, 2003: 44-60.
  • 8COURTOIS N T, KLIMOV A, PATARIN J, et al. Efficient algorithms for solving overdefined systems of multivar-iate polynomial equations[ C ]//Proceedings of Eurocrypt 2000. Berlin: Springer-Verlag, 2000: 392-407.
  • 9COURTOIS N, PIEPRZYK J. Cryptanalysis of block ciphers with overdefined systems of equations [ C ] //Proceedings of Asiacrypt 2002. Berlin: Springer-Verlag, 2002 : 267-287.
  • 10COURTOIS N, GOUBIN L, MEIER W, et al. Solving underdefined systems of multivariate quadratic equations [ C ]// Proceedings of PKC 2002. Berlin: Springer-Verlag, 2002 : 211-227.

二级参考文献30

  • 1巫治平,叶顶锋,马卫局.TTM密码系统的扰动变形[J].计算机研究与发展,2006,43(12):2082-2087. 被引量:3
  • 2陆晓亮,胡苏太.量子计算机的发展现状及趋势[J].高性能计算发展与应用,2006,(1):7-11.
  • 3唐川.16量子位量子计算机问世[J].中国科学院国家科学图书馆《科学研究动态监测快报》,2007,(4):1-3.
  • 4[4]Hoffstein J,Pipher J,Silverman J H.NTRU:ARing based Public Key Cryptosystem.Proc.of ANTS Ⅲ,LNCS 1423,pp.267-288.Springer-Verlag,1998.Crypto' 96.
  • 5[5]Okamoto T,Tanaka K,Uchiyama S.Quantum Public-Key Cryptosystems[A].CRYPT02000[C].LNCS 1880,,2000.147-165.
  • 6[6]Christopher Wolf.Multivariate Quadratic Polynomials in Public Key Cryptography.Katholieke Universiteit Leuven,Belgium,ISBN 90-5682-649-2,2005.
  • 7[1]Shor P W.Algorithms for Quantum Computation:Discrete Log and Factoring.Proceedings of the 35th Symposium on Foundations of Computer Science[C].1994,124~134.
  • 8Murphy S,Robshaw MJB.Essential algebraic structure within the AES.In:Moti Y,ed.Proc.of the 22nd Annual Int'l Cryptology Conf.on Advances in Cryptology.London:Springer-Verlag,2002.1-16.
  • 9Patarin J.Hidden fields equations (HFE) and isomorphisms of polynomials (IP):Two new families of asymmetric algorithms.LNCS 1070,Springer-Verlag,1996.33-48.http://www.minrank.org/#courtois/hfe.ps
  • 10Wadams W,Loustaunau P.An Introduction to Grobner Bases.New York:American Mathematical Society,1994.

共引文献10

同被引文献116

引证文献8

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部