Perturbed hidden matrix cryptosystems

Zhiping Wu*, Jintai Ding, Jason E. Gower, Dingfeng Ye

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

5 Citations (Scopus)

Abstract

We apply internal perturbation [3] to the matrix-type cryptosystems [C n] and HM constructed in [9]. Using small instances of these variants, we investigate the existence of linearization equations and degree 2 equations that could be used in a XL attack. Our results indicate that these new variants may be suitable for use in practical implementations. We propose a specific instance for practical implementation, and estimate its performance and security.

Original languageEnglish
Pages (from-to)595-602
Number of pages8
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3481
Issue numberII
DOIs
Publication statusPublished - 2005
Externally publishedYes
EventInternational Conference on Computational Science and Its Applications - ICCSA 2005 - , Singapore
Duration: 9 May 200512 May 2005

Keywords

  • Hidden matrix
  • Multivariate
  • Perturbation
  • Public key
  • XL attack

Fingerprint

Dive into the research topics of 'Perturbed hidden matrix cryptosystems'. Together they form a unique fingerprint.

Cite this