On the security and key generation of the ZHFE encryption scheme

Wenbin Zhang*, Chik How Tan

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

9 Citations (Scopus)

Abstract

At PQCrypto’14 Porras, Baena and Ding proposed a new interesting construction to overcome the security weakness of the HFE encryption scheme, and called their new encryption scheme ZHFE. They provided experimental evidence for the security of ZHFE, and proposed the parameter set (q, n,D) = (7, 55, 105) with claimed security level 280 estimated by experiment. However there is an important gap in the stateof- the-art cryptanalysis of ZHFE, i.e., a sound theoretical estimation for the security level of ZHFE is missing. In this paper we fill in this gap by computing upper bounds for the Q-Rank and for the degree of regularity of ZHFE in terms of logq D, and thus providing such a theoretical estimation. For instance the security level of ZHFE(7,55,105) can now be estimated theoretically as at least 296. Moreover for the inefficient key generation of ZHFE, we also provide a solution to improve it significantly, making almost no computation needed.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Proceedings
EditorsKatsunari Yoshioka, Kazuto Ogawa
PublisherSpringer Verlag
Pages289-304
Number of pages16
ISBN (Print)9783319445236
DOIs
Publication statusPublished - 2016
Externally publishedYes
Event11th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2016 - Tokyo, Japan
Duration: 12 Sept 201614 Sept 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9836 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2016
Country/TerritoryJapan
CityTokyo
Period12/09/1614/09/16

Keywords

  • HFE
  • Multivariate public key cryptography
  • Post-quantum cryptography
  • ZHFE

Fingerprint

Dive into the research topics of 'On the security and key generation of the ZHFE encryption scheme'. Together they form a unique fingerprint.

Cite this