Loading…
Public-key cryptography using paraunitary matrices
In this paper, we propose an algebraic approach for designing multivariate cryptosystems. Our method is based on formulating a general system of multivariate polynomial equations by paraunitary matrices. These matrices are a special family of invertible polynomial matrices that can be completely par...
Saved in:
Published in: | IEEE transactions on signal processing 2006-09, Vol.54 (9), p.3489-3504 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In this paper, we propose an algebraic approach for designing multivariate cryptosystems. Our method is based on formulating a general system of multivariate polynomial equations by paraunitary matrices. These matrices are a special family of invertible polynomial matrices that can be completely parameterized and efficiently generated by primitive building blocks. Using the general formulation that involves paraunitary matrices, we design a one-way function that operates over the fields of characteristic two. In order to include a trapdoor, we make some approximations to the paraunitary matrix. The result is a trapdoor one-way function that is efficient to evaluate but hard to invert unless secret information about the trapdoor is known. Using this function, we propose a paraunitary asymmetric cryptosystem (PAC). We present an instance of the PAC and show how it can be efficiently implemented. This instance operates on the finite field GF(256). The message block consists of 16 to 32 symbols from GF(256), i.e., the block size n is an integer between 16 and 32. The ciphertext block takes its elements from the same field and has at least ten extra symbols. We show that the encryption and decryption can be efficiently performed with complexities O(n 3 ) and O(n 2 ), respectively, where n is the size of the message block. Comparing complexities of the PAC to those in the hidden-field equation (HFE) family, we show that the PAC is faster in public-key generation and decryption. We study the computational security of the PAC. In addition, we show that the attacks developed for the HFE are not applicable on the PAC |
---|---|
ISSN: | 1053-587X 1941-0476 |
DOI: | 10.1109/TSP.2006.877670 |