Inoculating multivariate schemes against differential attacks

Jintai Ding*, Jason E. Gower

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

36 Citations (Scopus)

Abstract

We demonstrate how to prevent differential attacks on multivariate public key cryptosystems using the Plus (+) method of external perturbation. In particular, we prescribe adding as few as 10 Plus polynomials to the Perturbed Matsumoto-Imai (PMI) cryptosystem when g = 1 and r = 6, where θ is the Matsumoto-Imai exponent, n is the message length, g = gcd (θ, n), and r is the internal perturbation dimension; or as few as g + 10 when g ≠ 1. The external perturbation does not significantly decrease the efficiency of the system, and in fact has the additional benefit of resolving the problem of finding the true plaintext among several preimages of a given ciphertext. We call this new scheme the Perturbed Matsumoto-Imai-Plus (PMI+) cryptosystem.

Original languageEnglish
Title of host publicationPublic Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings
Pages290-301
Number of pages12
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006 - New York, NY, United States
Duration: 24 Apr 200626 Apr 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3958 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006
Country/TerritoryUnited States
CityNew York, NY
Period24/04/0626/04/06

Keywords

  • Cryptography
  • Differential
  • Matsumoto-Imai
  • Multivariate
  • Perturbation
  • Plus
  • Public key

Fingerprint

Dive into the research topics of 'Inoculating multivariate schemes against differential attacks'. Together they form a unique fingerprint.

Cite this