BMQE SYSTEM
A MQ Equations System based on Ergodic Matrix
Xiaoyi Zhou
1,2
, Jixin Ma
1
, Wencai Du
2
, Bo Zhao
3
, Miltos Petridis
1
and Yongzhe Zhao
4
1
School of Computing and Mathematical Science, University of Greenwich, 30 Park Row, SE10 9LS, London, U.K.
2
School of Computer Science and Technology, Hainan University, 58 Renmin Avenue, 570228 Haikou, Hainan, China
3
College of Computer Science and Technology, Huazhong University of Science and Technology
430074, Wuhan, Hubei, China
4
College of Computer Science and Technology, Jilin University, 2699 Qianwei Street, 130012, Changchun, Jilin, China
Keywords: Ergodic Matrix, Bisectional, Multivariate Quadratic, Fixing Variables, NP-hard.
Abstract: In this paper, we propose a multivariate quadratic (MQ) equation system based on ergodic matrix (EM) over
a finite field with q elements (denoted as
). The system actually implicates a problem which is equivalent
to the famous Graph Coloring problem, and therefore is NP complete for attackers. The complexity of
bisectional multivariate quadratic equation (BMQE) system is determined by the number of the variables, of
the equations and of the elements of
, which is denoted as n, m, and q, respectively. The paper shows that,
if the number of the equations is larger or equal to twice the number of the variables, and q
n
is large enough,
the system is complicated enough to prevent attacks from most of the existing attacking schemes.
1 INTRODUCTION
Public key cryptography has prevailed ever since
Diffie and Hellman published their paper “New
Directions in Cryptography” (Diffie and Hellman,
1976). Thereafter, algorithms based on public key
cryptography were developed in the following years,
e.g., RSA and ECC. The first is based on the
problem of factoring large numbers (1024 bits and
more), the latter on discrete logarithm. Both are
computationally difficult problems even modern
algorithms and computers are facing. Unfortunately,
these kinds of algorithms are either based on
factoring or discrete logarithms, which means the
“crypto-eggs” are in one basket – too dangerous.
Furthermore, particular techniques for factorization
and solving discrete logarithm improve constantly.
For example, polynomial time quantum algorithms
(Shore, 1997) can be used to solve these problems.
Therefore, they are facing the threats of quantum
computers (if they exist). Thus new cryptographic
schemes are in need to take the place of the
traditional ones.
At present, the most promising substitutable
scheme is based on the problem of solving
Multivariate Quadratic equations (MQ-problem)
over finite fields (Wolf, 2005). A multivariate
quadratic equations in n variables defined over a
finite field
is a polynomial P(x) of degree 2 of the
form P(x)=
∑
∑
with
coefficients α
ij
, β
i
and γ in
(Arditti et al., 2007).
This is also a research hotspot of the new generation
of public key cryptography. This kind of research
can be traced back to 1980s and some efforts have
been made to test its security since then. Thus there
are a few famous schemes, which can be classified
into Unbalanced Oil and Vinegar scheme (UOV)
(Baena et al., 2008), Stepwise Triangular Systems
(STS) (Wolf et al., 2006), Matsumoto-Imai Scheme
(MIC) (Patarin, 1998), Hidden Field Equations
(HFE) (Hamdi et al., 2006) and ℓ- Invertible Cycles
(ℓIC) (Ding & Wagner, 2008).
The advantages of the MQ-based public key
cryptography schemes (MPKCs) are mainly
reflected in their fast speed of encryption (or
signature verification) and resistance of quantum
attacks. Nonetheless, apart from UOV schemes with
proper parameter values, the basic types of these
schemes are considered to be insecure. HFE was
broken by Aviad Kipnis and Adi Shamir (Kipnis &
Shamir, 1999), STS was broken by Christopher Wolf
et al. (Wolf et al, 2004). As a result, revised MQ-
based schemes have been proposed, including
HFEv-, MIAi+, UOV/, STS (UOV), (ICi+), etc
431
Zhou X., Ma J., Du W., Zhao B., Petridis M. and Zhao Y. (2010).
BMQE SYSTEM - A MQ Equations System based on Ergodic Matrix.
In Proceedings of the International Conference on Security and Cryptography, pages 431-435
DOI: 10.5220/0002992304310435
Copyright
c
SciTePress