• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Huiyan, Wang Lianqiang, Lü Shuwang. A Study of Key Problems of HFE Cryptosystem[J]. Journal of Computer Research and Development, 2007, 44(7): 1205-1210.
Citation: Chen Huiyan, Wang Lianqiang, Lü Shuwang. A Study of Key Problems of HFE Cryptosystem[J]. Journal of Computer Research and Development, 2007, 44(7): 1205-1210.

A Study of Key Problems of HFE Cryptosystem

More Information
  • Published Date: July 14, 2007
  • The design and analysis of multivariate cryptosystems play an important role in theory research and practical use. The HFE cryptosystem presented by Jacques Patarin in 1996 has long been regarded as the most promising one of multivariate cryptosystems, and is a promising public key cryptosystem with many practical applications: very fast or very short digital signatures, fast public key encryption, etc. The security of the HFE cryptosystem is based on the problem of solving a system of multivariate quadratic equations over a finite field F. The problems about keys, which haven't been investigated in detail in literature, are very important in the HFE cryptosystem. Nontrivial public key and nontrivial private key are defined. If a reversible linear mapping φ:K→Fn is given where K is an extension of degree n of the finite field F and char(F)=2, there are the corresponding qn(n+1)∏ni=1(q\+i-1)\+2 nontrivial private keys for per nontrivial public key. A conclusion that solving a system of m multivariate quadratic equations with n variants (m≤n) over F is reduced to finding root of polynomial equation over K. This result leads to a deeper understanding of HFE and may yield a new kind of attack. In addition, two categories of weak keys on the HFE cryptosystem over F are introduced.
  • Related Articles

    [1]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [2]Deng Xiangtian, Qian Haifeng. Flexible Fine-Grained Authorization Public Key Encryption with Equality Test Under Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2222-2237. DOI: 10.7544/issn1000-1239.2021.20210596
    [3]Yang Ningbin, Zhou Quan, Xu Shumei. Public-Key Authenticated Encryption with Keyword Search Without Pairings[J]. Journal of Computer Research and Development, 2020, 57(10): 2125-2135. DOI: 10.7544/issn1000-1239.2020.20200318
    [4]Li Chunhua, Wang Hua, Zhang Yanzhe, Zhou Ke. Optimization for Broadcast Encryption in Cloud Using Extended Public Key[J]. Journal of Computer Research and Development, 2017, 54(12): 2818-2824. DOI: 10.7544/issn1000-1239.2017.20170902
    [5]Qin Xiongjun, Zhang Jiacheng, Lu Youyou, Shu Jiwu. A Key-Value Database Optimization Method Based on Raw Flash Device[J]. Journal of Computer Research and Development, 2017, 54(6): 1326-1336. DOI: 10.7544/issn1000-1239.2017.20170092
    [6]Fu Wei, Wu Xiaoping, Ye Qing, Xiao Nong, Lu Xicheng. A Multiple Replica Possession Proving Scheme Based on Public Key Partition[J]. Journal of Computer Research and Development, 2015, 52(7): 1672-1681. DOI: 10.7544/issn1000-1239.2015.20140353
    [7]Ma Chunguang, Wang Jiuru, Wu Peng, Zhang Hua. M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(10): 2109-2116.
    [8]Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, Wang Jian. Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System[J]. Journal of Computer Research and Development, 2012, 49(2): 304-311.
    [9]Xu Peng, Cui Guohua, and Lei Fengyu. An Efficient and Provably Secure IBE Scheme Without Bilinear Map[J]. Journal of Computer Research and Development, 2008, 45(10): 1687-1695.
    [10]Zheng Ji. An MDP Public-Key Digital Signature Scheme[J]. Journal of Computer Research and Development, 2005, 42(2).

Catalog

    Article views (712) PDF downloads (442) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return