Equivalent keys in ℳultivariate uadratic public key systems

Abstract ℳultivariate uadratic public key schemes have been suggested as early as 1985 by Matsumoto and Imai as an alternative for the RSA scheme. Since then, several schemes have been proposed, for example hidden field equations, unbalanced oil and vinegar schemes, and stepwise triangular schemes. All these schemes have a rather large key space for a secure choice of parameters. Surprisingly, the question of equivalent keys has not been discussed in the open literature until recently. In this article, we show that for all basic classes mentioned above, it is possible to reduce the private – and hence the public – key space by several orders of magnitude, i.e. the size of the set of possible private and hence public keys can be reduced. For the Matsumoto–Imai scheme, we are even able to show that the reductions we found are the only ones possible, i.e. that these reductions are tight. While the theorems developed in this article are of independent interest themselves as they broaden our understanding of ℳultivariate uadratic public key systems, we see applications of our results both in cryptanalysis and in memory efficient implementations of -schemes.

[1]  Louis Goubin,et al.  Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.

[2]  Masao Kasahara,et al.  A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme , 2004, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[3]  Louis Goubin,et al.  SFLASHv3, a fast asymmetric signature scheme , 2003, IACR Cryptol. ePrint Arch..

[4]  Jacques Patarin,et al.  Asymmetric Cryptography with a Hidden Monomial , 1996, CRYPTO.

[5]  Jintai Ding,et al.  Rainbow, a New Multivariable Polynomial Signature Scheme , 2005, ACNS.

[6]  A. Shamir,et al.  Cryptanalysis of the HFE Public Key Cryptosystem , 1999 .

[7]  Jean-Charles Faugère Algebraic cryptanalysis of HFE using Gröbner bases , 2002 .

[8]  Louis Goubin,et al.  Unbalanced Oil and Vinegar Signature Schemes -extended Version , 1999 .

[9]  Jacques Patarin,et al.  Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.

[10]  Bart Preneel,et al.  Superfluous Keys in Multivariate Quadratic Asymmetric Systems , 2004, IACR Cryptol. ePrint Arch..

[11]  Hideki Imai,et al.  Algebraic Methods for Constructing Asymmetric Cryptosystems , 1985, AAECC.

[12]  Feipei Lai,et al.  Tractable Rational Map Signature , 2005, Public Key Cryptography.

[13]  Andrey Bogdanov,et al.  Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? , 2008, IACR Cryptol. ePrint Arch..

[14]  Antoine Joux,et al.  Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases , 2003, CRYPTO.

[15]  Feipei Lai,et al.  Similar Keys of Multivariate Quadratic Public Key Cryptosystems , 2005, CANS.

[16]  Ariel Shamir,et al.  Cryptanalysis of the oil and vinegar signature scheme , 1998 .

[17]  Christopher Wolf,et al.  Multivariate quadratic polynomials in public key cryptography , 2005, IACR Cryptol. ePrint Arch..

[18]  Alex Biryukov,et al.  A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms , 2003, EUROCRYPT.

[19]  Bart Preneel,et al.  Equivalent Keys in Hfe, C * , and Variations , 2005 .

[20]  Bart Preneel,et al.  A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes , 2005, CT-RSA.

[21]  Jacques Patarin,et al.  Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new Families of Asymmetric Algorithms - Extended Version - , 1996 .

[22]  V. Hardman Author Information , 2021, Disability and Health Journal.

[23]  Christopher Wolf,et al.  Efficient Public Key Generation for HFE and Variations , 2004, Cryptographic Algorithms and their Uses.

[24]  Thomas Beth,et al.  Attacking the Affine Parts of SFLASH , 2001, IMACC.

[25]  Bart Preneel,et al.  Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC , 2004, SCN.

[26]  Ilia Toli Cryptanalysis of HFE , 2003, IACR Cryptol. ePrint Arch..

[27]  Olivier Billet,et al.  Cryptanalysis of the Square Cryptosystems , 2009, ASIACRYPT.

[28]  Chen Liqun,et al.  Public Key Cryptography - PKC 2005 , 2005 .

[29]  Bart Preneel,et al.  Asymmetric Cryptography: Hidden Field Equations , 2004, IACR Cryptol. ePrint Arch..

[30]  Bart Preneel,et al.  Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations , 2005, IACR Cryptol. ePrint Arch..

[31]  Hideki Imai,et al.  Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.

[32]  Hideki Imai,et al.  A cryptographically useful theorem on the connection between uni and multivariate polynomials , 1985 .

[33]  Jennifer Seberry,et al.  Public Key Cryptography , 2000, Lecture Notes in Computer Science.

[34]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.