Equivalent Keys in Hfe, C * , and Variations

In this article, we investigate the question of equivalent keys for two ${\mathcal M}$ultivariate ${\mathcal Q}$uadratic public key schemes HFE and C*−− and improve over a previously known result, which appeared at PKC 2005. Moreover, we show a new non-trivial extension of these results to the classes HFE-, HFEv, HFEv-, and C*−−, which are cryptographically stronger variants of the original HFE and C* schemes. In particular, we are able to reduce the size of the private — and hence the public — key space by at least one order of magnitude and several orders of magnitude on average. While the results are of independent interest themselves as they broaden our understanding of ${\mathcal M}$ultivariate ${\mathcal Q}$uadratic schemes, we also see applications both in cryptanalysis and in memory efficient implementations.

[1]  Jintai Ding,et al.  A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation , 2004, Public Key Cryptography.

[2]  Christopher Wolf,et al.  Efficient Public Key Generation for HFE and Variations , 2004, Cryptographic Algorithms and their Uses.

[3]  Hideki Imai,et al.  Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.

[4]  Thomas Beth,et al.  Attacking the Affine Parts of SFLASH , 2001, IMACC.

[5]  Bart Preneel,et al.  Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC , 2004, SCN.

[6]  Ilia Toli Cryptanalysis of HFE , 2003, IACR Cryptol. ePrint Arch..

[7]  Chen Liqun,et al.  Public Key Cryptography - PKC 2005 , 2005 .

[8]  Antoine Joux,et al.  Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases , 2003, CRYPTO.

[9]  Bart Preneel,et al.  Asymmetric Cryptography: Hidden Field Equations , 2004, IACR Cryptol. ePrint Arch..

[10]  Hideki Imai,et al.  Algebraic Methods for Constructing Asymmetric Cryptosystems , 1985, AAECC.

[11]  Bart Preneel,et al.  Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations , 2005, IACR Cryptol. ePrint Arch..

[12]  Adi Shamir,et al.  Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization , 1999, CRYPTO.

[13]  Louis Goubin,et al.  SFLASHv3, a fast asymmetric signature scheme , 2003, IACR Cryptol. ePrint Arch..

[14]  Louis Goubin,et al.  Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.

[15]  Jacques Patarin,et al.  Asymmetric Cryptography with a Hidden Monomial , 1996, CRYPTO.

[16]  A. Shamir,et al.  Cryptanalysis of the HFE Public Key Cryptosystem , 1999 .

[17]  Bart Preneel,et al.  A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes , 2005, CT-RSA.

[18]  Jacques Patarin,et al.  Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.

[19]  Bart Preneel,et al.  Superfluous Keys in Multivariate Quadratic Asymmetric Systems , 2004, IACR Cryptol. ePrint Arch..

[20]  Robert H. Deng,et al.  Public Key Cryptography – PKC 2004 , 2004, Lecture Notes in Computer Science.

[21]  Jacques Patarin,et al.  Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.

[22]  Bart Preneel,et al.  Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems , 2005, Public Key Cryptography.