Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2013

AUTHORS

Jintai Ding , Ai Ren , Chengdong Tao

ABSTRACT

Let X = (x 1,..,x n ) and Y = (y 1,...,y m ) be a pair of corresponding plaintext and ciphertext for a cryptosystem. We define an embedded surface of this cryptosystem as any polynomial equation:

PAGES

122-136

References to SciGraph publications

  • 2007. High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems in PUBLIC KEY CRYPTOGRAPHY – PKC 2007
  • 2010. MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals in INFORMATION, SECURITY AND CRYPTOLOGY – ICISC 2009
  • 1995. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88 in ADVANCES IN CRYPTOLOGY — CRYPT0’ 95
  • 2013-04. Multivariate public key cryptosystems from diophantine equations in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2006. A “Medium-Field” Multivariate Public-Key Encryption Scheme in TOPICS IN CRYPTOLOGY – CT-RSA 2006
  • 2008. Algebraic Attack on HFE Revisited in INFORMATION SECURITY
  • 2010. The Degree of Regularity of HFE Systems in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010
  • Book

    TITLE

    Information Security and Cryptology

    ISBN

    978-3-642-38518-6
    978-3-642-38519-3

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-38519-3_9

    DOI

    http://dx.doi.org/10.1007/978-3-642-38519-3_9

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1010841523


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "author": [
          {
            "affiliation": {
              "alternateName": "Chongqing University", 
              "id": "https://www.grid.ac/institutes/grid.190737.b", 
              "name": [
                "Chongqing University, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Ding", 
            "givenName": "Jintai", 
            "id": "sg:person.010723403013.04", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Cincinnati", 
              "id": "https://www.grid.ac/institutes/grid.24827.3b", 
              "name": [
                "University of Cincinnati, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Ren", 
            "givenName": "Ai", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "South China University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.79703.3a", 
              "name": [
                "South China University of Technology, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Tao", 
            "givenName": "Chengdong", 
            "id": "sg:person.012204200141.85", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012204200141.85"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-540-71677-8_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002694957", 
              "https://doi.org/10.1007/978-3-540-71677-8_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11605805_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006462081", 
              "https://doi.org/10.1007/11605805_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11605805_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006462081", 
              "https://doi.org/10.1007/11605805_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-011-9582-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024205953", 
              "https://doi.org/10.1007/s10623-011-9582-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-85886-7_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040695999", 
              "https://doi.org/10.1007/978-3-540-85886-7_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-85886-7_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040695999", 
              "https://doi.org/10.1007/978-3-540-85886-7_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17373-8_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041554151", 
              "https://doi.org/10.1007/978-3-642-17373-8_32"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17373-8_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041554151", 
              "https://doi.org/10.1007/978-3-642-17373-8_32"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14423-3_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041918753", 
              "https://doi.org/10.1007/978-3-642-14423-3_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14423-3_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041918753", 
              "https://doi.org/10.1007/978-3-642-14423-3_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44750-4_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1051590862", 
              "https://doi.org/10.1007/3-540-44750-4_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/s0036144598347011", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062877995"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2013", 
        "datePublishedReg": "2013-01-01", 
        "description": "Let X\u2009=\u2009(x 1,..,x n ) and Y\u2009=\u2009(y 1,...,y m ) be a pair of corresponding plaintext and ciphertext for a cryptosystem. We define an embedded surface of this cryptosystem as any polynomial equation:", 
        "editor": [
          {
            "familyName": "Kuty\u0142owski", 
            "givenName": "Miros\u0142aw", 
            "type": "Person"
          }, 
          {
            "familyName": "Yung", 
            "givenName": "Moti", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-38519-3_9", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-642-38518-6", 
            "978-3-642-38519-3"
          ], 
          "name": "Information Security and Cryptology", 
          "type": "Book"
        }, 
        "name": "Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations", 
        "pagination": "122-136", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-38519-3_9"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "33a6b38fcf4a66ac962dc809e575249e88e4406cebea5451778726ec907b20c6"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1010841523"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-38519-3_9", 
          "https://app.dimensions.ai/details/publication/pub.1010841523"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T10:31", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8659_00000249.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-642-38519-3_9"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38519-3_9'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38519-3_9'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38519-3_9'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38519-3_9'


     

    This table displays all metadata directly associated to this object as RDF triples.

    112 TRIPLES      22 PREDICATES      33 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-38519-3_9 schema:author Ncf41e50b0a7442d889459f344891a34d
    2 schema:citation sg:pub.10.1007/11605805_9
    3 sg:pub.10.1007/3-540-44750-4_20
    4 sg:pub.10.1007/978-3-540-71677-8_16
    5 sg:pub.10.1007/978-3-540-85886-7_15
    6 sg:pub.10.1007/978-3-642-14423-3_7
    7 sg:pub.10.1007/978-3-642-17373-8_32
    8 sg:pub.10.1007/s10623-011-9582-1
    9 https://doi.org/10.1137/s0036144598347011
    10 schema:datePublished 2013
    11 schema:datePublishedReg 2013-01-01
    12 schema:description Let X = (x 1,..,x n ) and Y = (y 1,...,y m ) be a pair of corresponding plaintext and ciphertext for a cryptosystem. We define an embedded surface of this cryptosystem as any polynomial equation:
    13 schema:editor N7f9de0c322ca4acc984d730aec7d0ded
    14 schema:genre chapter
    15 schema:inLanguage en
    16 schema:isAccessibleForFree false
    17 schema:isPartOf N9837d223454c43dba87a735f7aa9132d
    18 schema:name Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations
    19 schema:pagination 122-136
    20 schema:productId N65ab12ad525947beaf1e7edb12e368d4
    21 N9b4b1ce5b97f4e499e057b3d9df039c8
    22 N9e1898207e3a4f159bd733df913ebb29
    23 schema:publisher Nb41c7ce21adf4cf0bf54b4cbd95b1722
    24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010841523
    25 https://doi.org/10.1007/978-3-642-38519-3_9
    26 schema:sdDatePublished 2019-04-15T10:31
    27 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    28 schema:sdPublisher N99dc5c7c1b27490294f53be3bf760bcc
    29 schema:url http://link.springer.com/10.1007/978-3-642-38519-3_9
    30 sgo:license sg:explorer/license/
    31 sgo:sdDataset chapters
    32 rdf:type schema:Chapter
    33 N0b6c255b591849869119c85be4a71fec rdf:first N27717928b2234287964cecc3a239e333
    34 rdf:rest N31f763c6a7c74148acde80ba0f06d339
    35 N27717928b2234287964cecc3a239e333 schema:affiliation https://www.grid.ac/institutes/grid.24827.3b
    36 schema:familyName Ren
    37 schema:givenName Ai
    38 rdf:type schema:Person
    39 N31f763c6a7c74148acde80ba0f06d339 rdf:first sg:person.012204200141.85
    40 rdf:rest rdf:nil
    41 N5cf0cefb4226419ab4d18d3ff97a1d38 schema:familyName Kutyłowski
    42 schema:givenName Mirosław
    43 rdf:type schema:Person
    44 N62353573ef01482b9c808dac8d09b87f rdf:first N8c38ab4a50f94d5195524e533394eec4
    45 rdf:rest rdf:nil
    46 N65ab12ad525947beaf1e7edb12e368d4 schema:name dimensions_id
    47 schema:value pub.1010841523
    48 rdf:type schema:PropertyValue
    49 N7f9de0c322ca4acc984d730aec7d0ded rdf:first N5cf0cefb4226419ab4d18d3ff97a1d38
    50 rdf:rest N62353573ef01482b9c808dac8d09b87f
    51 N8c38ab4a50f94d5195524e533394eec4 schema:familyName Yung
    52 schema:givenName Moti
    53 rdf:type schema:Person
    54 N9837d223454c43dba87a735f7aa9132d schema:isbn 978-3-642-38518-6
    55 978-3-642-38519-3
    56 schema:name Information Security and Cryptology
    57 rdf:type schema:Book
    58 N99dc5c7c1b27490294f53be3bf760bcc schema:name Springer Nature - SN SciGraph project
    59 rdf:type schema:Organization
    60 N9b4b1ce5b97f4e499e057b3d9df039c8 schema:name doi
    61 schema:value 10.1007/978-3-642-38519-3_9
    62 rdf:type schema:PropertyValue
    63 N9e1898207e3a4f159bd733df913ebb29 schema:name readcube_id
    64 schema:value 33a6b38fcf4a66ac962dc809e575249e88e4406cebea5451778726ec907b20c6
    65 rdf:type schema:PropertyValue
    66 Nb41c7ce21adf4cf0bf54b4cbd95b1722 schema:location Berlin, Heidelberg
    67 schema:name Springer Berlin Heidelberg
    68 rdf:type schema:Organisation
    69 Ncf41e50b0a7442d889459f344891a34d rdf:first sg:person.010723403013.04
    70 rdf:rest N0b6c255b591849869119c85be4a71fec
    71 sg:person.010723403013.04 schema:affiliation https://www.grid.ac/institutes/grid.190737.b
    72 schema:familyName Ding
    73 schema:givenName Jintai
    74 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04
    75 rdf:type schema:Person
    76 sg:person.012204200141.85 schema:affiliation https://www.grid.ac/institutes/grid.79703.3a
    77 schema:familyName Tao
    78 schema:givenName Chengdong
    79 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012204200141.85
    80 rdf:type schema:Person
    81 sg:pub.10.1007/11605805_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006462081
    82 https://doi.org/10.1007/11605805_9
    83 rdf:type schema:CreativeWork
    84 sg:pub.10.1007/3-540-44750-4_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051590862
    85 https://doi.org/10.1007/3-540-44750-4_20
    86 rdf:type schema:CreativeWork
    87 sg:pub.10.1007/978-3-540-71677-8_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002694957
    88 https://doi.org/10.1007/978-3-540-71677-8_16
    89 rdf:type schema:CreativeWork
    90 sg:pub.10.1007/978-3-540-85886-7_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040695999
    91 https://doi.org/10.1007/978-3-540-85886-7_15
    92 rdf:type schema:CreativeWork
    93 sg:pub.10.1007/978-3-642-14423-3_7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041918753
    94 https://doi.org/10.1007/978-3-642-14423-3_7
    95 rdf:type schema:CreativeWork
    96 sg:pub.10.1007/978-3-642-17373-8_32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041554151
    97 https://doi.org/10.1007/978-3-642-17373-8_32
    98 rdf:type schema:CreativeWork
    99 sg:pub.10.1007/s10623-011-9582-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024205953
    100 https://doi.org/10.1007/s10623-011-9582-1
    101 rdf:type schema:CreativeWork
    102 https://doi.org/10.1137/s0036144598347011 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062877995
    103 rdf:type schema:CreativeWork
    104 https://www.grid.ac/institutes/grid.190737.b schema:alternateName Chongqing University
    105 schema:name Chongqing University, China
    106 rdf:type schema:Organization
    107 https://www.grid.ac/institutes/grid.24827.3b schema:alternateName University of Cincinnati
    108 schema:name University of Cincinnati, USA
    109 rdf:type schema:Organization
    110 https://www.grid.ac/institutes/grid.79703.3a schema:alternateName South China University of Technology
    111 schema:name South China University of Technology, China
    112 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...