Skip to main content
Log in

A new scheme based on the MI scheme and its analysis

  • Published:
Journal of Electronics (China)

Abstract

This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our new scheme, named the Multi-layer MI (MMI) scheme, has a structure of multi-layer central map. Firstly, this article introduces the MI scheme and describes linearization attack and differential attack; then prescribes the designation of MMI in detail, and proves that MMI can resist both linearization attack and differential attack. Besides, this article also proves that MMI can resist recent eXtended Linearization (XL)-like methods. In the end, this article concludes that MMI also maintains the efficiency of MI.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. P. W. Shor. Algorithms for quantum computation: discrete logarithms and factoring. 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, November 1994, 124–134.

  2. T. Matsumoto and H. Imai. Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. EUROCRYTP’88, Davos, Switzerland, May 1988, LNCS Volume 330, 419–453.

  3. J. Patarin. Hidden fields equations (HFE) and isomorphism of polynomials (IP): Two new families of asymmetric algorithms. EUROCRYPT’96, Saragossa, Spain, May 1996, LNCS Volume 1070, 33–48.

  4. A. Kipnis, J. Patarin, and L. Goubin. Unbalanced oil and vinegar signature schemes. EUROCRYPT’99, Prague, Czech, May 1999, LNCS Volume 1592, 206–222.

  5. C. Wolf, A. Braeken, and B. Preneel. Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC. Security in Communication Networks 2004, Amalfi, Italy, September 2005, LNCS Volume 3352, 294–309.

  6. Lih-Chung Wang, and Bo-Yin Yang. A “medium-field” multivariate public-key encryption scheme. CT-RSA 2006, San Jose, CA, USA, February 2006, LNCS Volume 3860, 132–149.

  7. Jintai Ding, Christopher Wolf, and Bo-Yin Yang. l-Invertible cycles for Multivariate Quadratic (MQ) Public Key Cryptography. PKC 2007, Beijing, China, April 2007, LNCS Volume 4450, 266–281.

  8. J. Patarin, L. Goubin, and N. Courtois. C-+* and HM: Variations around two schemes of T. Matsumoto and H. Imai. ASIACRYPT’98, Beijing, China, October 1998, LNCS Volume 1514, 35–50.

  9. Jintai Ding. A new variant of the Matsumoto-Imai cryptosystem through perturbation. PKC 2004, Singapore, March 2004, LNCS Volume 2947, 305–318.

  10. M. L. Akkar, N. T. Courtois, R. Duteuil, et al.. A fast and secure implementation of SFLASH. PKC 2003, Miami, FL, USA, January 2003, LNCS Volume 2567, 267–278.

  11. NESSIE project homepage: http://www.cryptonessie.org.

  12. J. Patarin. Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt’88. CRYPTO’95, Santa Barbara, CA, USA, August 1995, LNCS Volume 963, 248–261.

  13. P. Fouque and L. Granboulan. Differential cryptanalysis for multivariate schemes. EUROCRYPT 2005, Aarhus, Denmark, May 2005, LNCS Volume 3494, 341–353.

  14. Bo-Yin Yang and Jiun-Ming Chen. All in the XL family: Theory and practice. ICISC 2004, Seoul, Korea, December 2004, LNCS Volume 3506, 67–86.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luyao Jiao.

Additional information

Supported by the National High Technology Research and Development Program of China (863 Program)(No. 2009-aa012201) and Key Library of Communication Technology (No. 9140C1103040902).

About this article

Cite this article

Jiao, L., Li, Y. & Qiao, S. A new scheme based on the MI scheme and its analysis. J. Electron.(China) 30, 198–203 (2013). https://doi.org/10.1007/s11767-013-2153-z

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11767-013-2153-z

Key words

CLC index

Navigation