Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask

Yuntao Wang, Yasuhiko Ikematsu, Takanori Yasuda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In ProvSec 2018, Yasuda proposed a multivariate public key cryptosystem using the pq-method, whose security is based on the constrained MQ problem. Afterward, in SCIS 2020, he improved the cryptosystem by adding noise elements and simultaneously considered the cryptanalysis using the NTRU method. This improved cryptosystem is the first one combining lattice and multivariate public-key cryptosystem. In this paper, we propose three variants of Yasuda’s cryptosystem. The main improvement is that we invite the linear structures instead of the multivariate quadratic polynomials. In particular, we simplify the procedure in key generation mechanism by using a linear mapping mask which produces resistance against the key-recovery attack. Furthermore, we propose a ring version that is quite efficient compared to the standard versions. Finally, we adopt the ring-LWE method instead of the original NTRU method to give a more promising cryptanalysis.

Original languageEnglish
Title of host publicationProvable and Practical Security - 16th International Conference, ProvSec 2022, Proceedings
EditorsChunpeng Ge, Fuchun Guo
PublisherSpringer Science and Business Media Deutschland GmbH
Pages88-104
Number of pages17
ISBN (Print)9783031209161
DOIs
Publication statusPublished - 2022
Event16th International Conference on Provable and Practical Security, ProvSec 2022 - Nanjing, China
Duration: Nov 11 2022Nov 12 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13600 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th International Conference on Provable and Practical Security, ProvSec 2022
Country/TerritoryChina
CityNanjing
Period11/11/2211/12/22

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask'. Together they form a unique fingerprint.

Cite this