2025-02-23T03:38:47-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22irk-123456789-152793%22&qt=morelikethis&rows=5
2025-02-23T03:38:47-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22irk-123456789-152793%22&qt=morelikethis&rows=5
2025-02-23T03:38:47-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-23T03:38:47-05:00 DEBUG: Deserialized SOLR response
On two windows multivariate cryptosystem depending on random parameters
The concept of multivariate bijective map of an affine space Kn over commutative Ring K was already used in Cryptography. We consider the idea of nonbijective multivariate polynomial map Fn of Kn into Kn represented as ''partially invertible decomposition'' F(1)nF(2)n…F(k)n, k=k...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Інститут прикладної математики і механіки НАН України
2015
|
Series: | Algebra and Discrete Mathematics |
Online Access: | http://dspace.nbuv.gov.ua/handle/123456789/152793 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The concept of multivariate bijective map of an affine space Kn over commutative Ring K was already used in Cryptography. We consider the idea of nonbijective multivariate polynomial map Fn of Kn into Kn represented as ''partially invertible decomposition'' F(1)nF(2)n…F(k)n, k=k(n), such that knowledge on the decomposition and given value u=F(v) allow to restore a special part v′ of reimage v. We combine an idea of ''oil and vinegar signatures cryptosystem'' with the idea of linguistic graph based map with partially invertible decomposition to introduce a new cryptosystem. The decomposition will be induced by pseudorandom walk on the linguistic graph and its special quotient (homomorphic image). We estimate the complexity of such general algorithm in case of special family of graphs with quotients, where both graphs form known families of Extremal Graph Theory. The map created by key holder (Alice) corresponds to pseudorandom sequence of ring elements. The postquantum version of the algorithm can be obtained simply by the usage of random strings instead of pseudorandom. |
---|