Key Recovery on Hidden Monomial Multivariate Schemes
نویسندگان
چکیده
In this paper, we study the key recovery problem for the C∗ scheme and generalisations where the quadratic monomial of C∗ (the product of two linearized monomials) is replaced by a product of three or more linearized monomials. This problem has been further generalized to any system of multivariate polynomials hidden by two invertible linear maps and named the Isomorphism of Polynomials (IP ) problem by Patarin. Some cryptosystems have been built on this apparently hard problem such as an authentication protocol proposed by Patarin and a traitor tracing scheme proposed by Billet and Gilbert. Here we show that if the hidden multivariate system is the projection of a quadratic monomial on a base finite field, as in C∗, or a cubic (or higher) monomial as in the traitor tracing scheme, then it is possible to recover an equivalent secret key in polynomial time O(n) where n is the number of variables and d is the degree of the public polynomials.
منابع مشابه
... : Variations around two schemes of T. Matsumoto and H. Imai
In 4], H. Imai and T. Matsumoto presented some new candidate trapdoor one-way permutations with a public key given as multivariate polynomials over a nite eld. One of these schemes was later presented in 7] under the name C , and was based on the idea of hiding a monomial eld equation. This scheme was broken in 8] by Jacques Patarin, due to unexpected algebraic properties.) some schemes to repa...
متن کاملC*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
In [4], H. Imai and T. Matsumoto presented some new candidate trapdoor one-way permutations with a public key given as multivariate polynomials over a finite field. One of these schemes was later presented in [7] under the name C∗, and was based on the idea of hiding a monomial field equation. This scheme was broken in [8] by Jacques Patarin, due to unexpected algebraic properties. J. Patarin a...
متن کاملA family of weak keys in HFE and the corresponding practical key-recovery
The HFE (Hidden Field Equations) cryptosystem is one of the most interesting public-key multivariate scheme. It has been proposed more than 10 years ago by Patarin and seems to withstand the attacks that break many other multivariate schemes, since only subexponential ones have been proposed. The public key is a system of quadratic equations in many variables. These equations are generated from...
متن کاملOn enumeration of polynomial equivalence classes and their application to MPKC
The Isomorphism of Polynomials (IP) is one of the most fundamental problems in multivariate public key cryptography (MPKC). In this paper, we introduce a new framework to study the counting problem associated to IP. Namely, we present tools of finite geometry allowing to investigate the counting problem associated to IP. Precisely, we focus on enumerating or estimating the number of isomorphism...
متن کاملHidden Signature Schemes Based on the Discrete Logarithm Problem and Related Concepts Hidden Signature Schemes Based on the Discrete Logarithm Problem and Related Concepts
Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by rep...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008