Proposal of PPS Multivariate Public Key Cryptosystems

In this paper we propose a new MPKC, called PPS, based on (i) the 2-layer nonlinear piece in hand method, (ii) PMI, and (iii) STS. The PPS is a specific MPKC obtained by applying the 2-layer nonlinear piece in hand method to STS, in the manner that the rank and randomness of the lower rank steps in the original secret polynomial vector of STS are enhanced by adding a perturbation polynomial vector and moreover PMI is used in the auxiliary part. The PPS overcomes the drawbacks of the three schemes by the advantage of the three schemes themself. Thus, PPS can be thought to be immune simultaneously from the algebraic attacks, such as the Grobner bases attacks, from the rank attacks, and from the differential attacks.

[1]  Magnus Daum,et al.  On the Security of HFE, HFEv- and Quartz , 2003, Public Key Cryptography.

[2]  J. Faugère,et al.  On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations , 2004 .

[3]  Bart Preneel,et al.  Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC , 2004, SCN.

[4]  Kohtaro Tadaki,et al.  Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[5]  Bo-Yin Yang,et al.  l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography , 2007, Public Key Cryptography.

[6]  Antoine Joux,et al.  Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases , 2003, CRYPTO.

[7]  Hideki Imai,et al.  Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.

[8]  Jintai Ding,et al.  A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation , 2004, Public Key Cryptography.

[9]  Kohtaro Tadaki,et al.  Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems , 2008, PQCrypto.

[10]  Jacques Stern,et al.  Attacks on the Birational Permutation Signature Schemes , 1993, CRYPTO.

[11]  Jacques Patarin,et al.  Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.

[12]  Ariel Shamir,et al.  Cryptanalysis of the oil and vinegar signature scheme , 1998 .

[13]  Bo-Yin Yang,et al.  TTS: Rank Attacks in Tame-Like Multivariate PKCs , 2004, IACR Cryptol. ePrint Arch..

[14]  B. Salvy,et al.  Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems , 2022 .

[15]  Louis Goubin,et al.  Cryptanalysis of the TTM Cryptosystem , 2000, ASIACRYPT.

[16]  Adi Shamir,et al.  Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.

[17]  Tadaki Kohtaro,et al.  Proposal of MOCHIGOMA(Piece in Hand) Concept for Multivariate Type Public Key Cryptosystem , 2004 .

[18]  Jacques Stern,et al.  Differential Cryptanalysis for Multivariate Schemes , 2005, EUROCRYPT.

[19]  Jintai Ding,et al.  Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem , 2005, IMACC.

[20]  Masao Kasahara,et al.  A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme , 2004, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.

[21]  T. T. Moh,et al.  A public key system with signature and master key functions , 1999 .

[22]  Masao Kasahara,et al.  A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[23]  Jintai Ding,et al.  Cryptanalysis of Rational Multivariate Public Key Cryptosystems , 2008, PQCrypto.

[24]  Jacques Patarin,et al.  Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.

[25]  Kohtaro Tadaki,et al.  Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key , 2004, IACR Cryptol. ePrint Arch..

[26]  Toshinobu Kaneko,et al.  Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[27]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[28]  Jintai Ding,et al.  Inoculating Multivariate Schemes Against Differential Attacks , 2006, Public Key Cryptography.

[29]  Louis Goubin,et al.  Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.

[30]  Kohtaro Tadaki,et al.  Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems , 2008, IACR Cryptol. ePrint Arch..

[31]  Adi Shamir,et al.  Efficient Signature Schemes Based on Birational Permutations , 1993, CRYPTO.

[32]  Jacques Stern,et al.  Practical Cryptanalysis of SFLASH , 2007, CRYPTO.