Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2013 (2013), Article ID 872962, 8 pages
http://dx.doi.org/10.1155/2013/872962
Research Article

Sieve Method for Polynomial Linear Equivalence

Baocang Wang1,2 and Yupu Hu1,3

1State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China
2Guangxi Experiment Center of Information Science, Guilin University of Electronic Technology, Guilin, Guangxi 541004, China
3Guangxi Key Lab of Wireless Wide Band Communication and Signal Processing, Guilin University of Electronic Technology, Guilin 541004, China

Received 5 August 2013; Accepted 2 November 2013

Academic Editor: Jacek Rokicki

Copyright © 2013 Baocang Wang and Yupu Hu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Koblitz and A. J. Menezes, “A survey of public-key cryptosystems,” SIAM Review, vol. 46, no. 4, pp. 599–634, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  2. P. Wang and F. Zhang, “An efficient collision detection method for computing discrete logarithms with pollard's rho,” Journal of Applied Mathematics, vol. 2012, Article ID 635909, 15 pages, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  3. P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM Journal on Computing, vol. 26, no. 5, pp. 1484–1509, 1997. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  4. D. Cheung, D. Maslov, J. Mathew, and D. K. Pradhan, “On the design and optimization of a quantum polynomial-time attack on elliptic curve cryptography,” in Proceedings of the 3rd Workshop on Theory of Quantum Computation, Communication, and Cryptography (TQC '08), vol. 5016 of LNCS, pp. 96–104, Springer, Tokyo, Japan, 2008.
  5. J. Ding, J. E. Gower, and D. S. J. Schmidt, Multivariate Public Key Cryptosystems, vol. 25 of Advances in Information Security, Springer, Berlin, Germany, 2006.
  6. M. R. Garey and D. S. Johnson, Computers and Intractability, A Guide to the Theory of NP-Completeness, Freeman, San Francisco, Calif, USA, 1979.
  7. J. Patarin, “Hidden fields equations (HFE) and isomorphism of polynomials (IP): two new families of asymmetric algorithms,” in Proceedings of Advances in Cryptology-Eurocrypt 1996, vol. 1070 of LNCS, pp. 33–48, Springer, Saragossa, Spain, 1996.
  8. J. Patarin, L. Goubin, and N. Courtois, “Improved algorithms for isomorphisms of polynomials,” in Proceedings of Advances in Cryptology- Eurocrypt 1998, vol. 1403 of LNCS, pp. 184–200, Springer, Espoo, Finland, 1998.
  9. F. Levy-dit-Vehel and L. Perret, “Polynomial equivalence problems and applications to multivariate cryptosystems,” in Proceedings of the Conference on Progress in Cryptology (INDOCRYPT '03), vol. 2904 of LNCS, pp. 235–251, Thomas Johansson, Subhamoy Maitra, New Delhi, India, 2003.
  10. L. Perret and A. Bayad, “A differential approach to a polynomial equivalence problem,” in Proceedings of International Symposium on Information Theory (ISIT '04), p. 140, IEEE Press, Chicago, Ill, USA, July 2004. View at Scopus
  11. J. Faugere and L. Perret, “Polynomial equivalence problems: algorithmic and theoretical aspects,” in Proceedings of Advances in Cryptology (Eurocrypt '06), vol. 4004 of LNCS, pp. 30–47, Springer, St. Petersburg, Russia, 2006.
  12. C. Bouillaguet, J. Faugere, P. Fouque, and L. Perret, “Isomorphism of polynomials: new results,” http://citeseerx.ist.psu.edu.
  13. C. Bouillaguet, J. Faugere, P. Fouque, and L. Perret, “Differentialalgebraic algorithms for the isomorphism of polynomials problem,” IACR Cryptology ePrint Archive 2009, http://eprint.iacr.org/2009/583.
  14. C. Bouillaguet, P. Fouque, and A. Veber, “Graph-theoretic algorithms for the isomorphism of polynomials ‘problem’,” in Proceedings of Ad- vances in Cryptology (Eurocrypt '13), vol. 7881 of LNCS, pp. 211–227, Springer, Athens, Greece, 2013.
  15. J. Berthomieu, J. Faugere, and L. Perret, “Polynomial-time algorithms for quadratic isomorphism of polynomials,” 2013, http://arxiv.org/abs/1307.4974.
  16. T. Matsumoto and H. Imai, “Public quadratic polynomial-tuples for efficient signature-verification and message-encryption,” in Proceedings of the Advances in Cryptology (Eurocrypt '88), vol. 330 of LNCS, pp. 419–453, Springer, Davos, Switzerland, 1988.
  17. A. Kipnis, J. Patarin, and L. Goubin, “Unbalanced oil and vinegar signature schemes,” in Proceedings of the Advances in Cryptology (Eurocrypt '99), vol. 1592 of LNCS, pp. 206–222, Springer, Prague, Czech Republic, 1999.
  18. J. Patarin, N. Courtois, and L. Goubin, “Flash, a fast multivariate signature algorithm,” in Proceedings of the Cryptographers Track at RSA Conference (CT-RSA '01), vol. 2020 of LNCS, pp. 298–307, Springer, San Francisco, Calif, USA, 2001.
  19. O. Billet and H. Gilbert, “A traceable block cipher,” in Proceedings of Advances in Cryptology (Asiacrypt '00), vol. 2894 of LNCS, pp. 331–346, Springer, Taipei, Taiwan, 2003.
  20. J. Ding, C. Wolf, and B. Y. Yang, “l-invertible cycles for multivariate quadratic public key cryptography,” in Proceedings of the 10th IACR International Conference on Practice and Theory of Public Key Cryptography (PKC '07), vol. 4450 of LNCS, pp. 266–281, Springer, Beijing, China, 2007.
  21. J. Baena, C. Clough, and J. Ding, “Square-vinegar signature scheme,” in Proceedings of the 2nd International Workshop on Post-Quantum Cryptography (PQCrypto '08), vol. 5299 of LNCS, pp. 17–30, Springer, Cincinnati, Ohio, USA, 2008.
  22. C. Clough, J. Baena, J. Ding, B. Y. Yang, and M. S. Chen, “Square, a new multivariate encryption scheme,” in Proceedings of the Cryptogra- phers Track at RSA Conference (CT-RSA '09), vol. 5473 of LNCS, pp. 252–264, Springer, San Francisco, Calif, USA, 2009.
  23. W. Geiselmann, W. Meier, and S. Rainer, “An attack on the isomorphisms of polynomials problem with one secret,” International Journal of Information Security, vol. 2, no. 1, pp. 59–64, 2003. View at Google Scholar
  24. L. Perret, “A fast cryptanalysis of the isomorphism of polynomials with one secret problem,” in Proceedings of Advances in Cryptology (Eurocrypt '05), vol. 3439 of LNCS, pp. 354–370, Springer, Aarhus, Denmark, 2005.
  25. C. Bouillaguet, J. Faugere, P. Fouque, and L. Perret, “Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem,” in Proceedings of the 14th IACR International Conference on Practice and Theory of Public Key Cryptography (PKC '11), vol. 6571 of LNCS, pp. 473–493, Springer, Taormina, Italy, 2011.
  26. K. Sakumoto, T. Shirai, and H. Hiwatari, “Public-key identification schemes based on multivariate quadratic polynomials,” in Proceedings of Advances in Cryptology (Crypto '11), vol. 6841 of LNCS, pp. 706–723, Springer, Santa Barbara, Calif, USA, 2011.
  27. S. Tang and L. Xu, “Proxy signature scheme based on isomorphisms of polynomials,” in Proceedings of the 6th International Conference on Network and System Security (NSS '12), vol. 7645 of LNCS, pp. 113–125, Springer, Fujian, China, 2012.
  28. S. Tang and L. Xu, “Towards provably secure proxy signature scheme based on isomorphisms of polynomials,” Future Generation Computer Systems, 2013. View at Google Scholar
  29. M. Agrawal and N. Saxena, “Equivalence of f-algebras and cubic forms,” in Proceedings of the 23rd Annual Symposium on Theoretical Aspects of Computer Science (STACS '06), vol. 3884 of LNCS, pp. 115–126, Springer, Marseille, France, 2006.
  30. C. Wolf and B. Preneel, “Taxonomy of public key schemes based on the problem of multivariate quadratic equations,” IACR Cryptology ePrint Archive 2005, https://eprint.iacr.org/2005/077.