Constructing linear transformations of MPKC by generalized central symmetric matrices

Jiang Xin*, Hu Lei, Ding Jintai

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Abstract

The multivariate public key cryptosystems (MPKCs) have a bigger scale of private key and public key than conventional number theoretic based public key cryptosystems like RSA, DH, and ECDH. In this paper, we present a method to construct the linear transformations in a private key of MPKC by generalized central symmetric matrices over a finite field of odd characteristic. This method reduces 3/8 of the scale of private key and improves the computation of inverting the linear transformations in decryption or signature generation to 3/4. It also speedups the generation of public and private keys of MPKC. The method can be recursively applied for achieving a further advantage.

Original languageEnglish
Title of host publication2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009 - Hong Kong, China
Duration: 20 Aug 200922 Aug 2009

Publication series

Name2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009

Conference

Conference2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009
Country/TerritoryChina
CityHong Kong
Period20/08/0922/08/09

Keywords

  • Block matrix
  • Generalized central symmetric matrix
  • HFE
  • Linear transformation
  • Multivariate public key cryptosystem (MPKC)
  • Rainbow
  • Sflash
  • TTS

Fingerprint

Dive into the research topics of 'Constructing linear transformations of MPKC by generalized central symmetric matrices'. Together they form a unique fingerprint.

Cite this