Skip to main content

Questions tagged [multivariate-cryptography]

A generic term for asymmetric cryptographic primitives based on multivariate polynomials over a finite field

1 vote
0 answers
112 views

Lattice, Code, MQ - these types of cryptosystems are essentially polynomial. Lattice: degree-1, constrain on the solution, (need to have small norms) Code, MQ: finding polynomial solutions. ...
DannyNiu's user avatar
  • 11.5k
1 vote
0 answers
62 views

In multivariate signature schemes like UOV and its variants, the signer signs a message $t\in \mathbb{F}_p^m$ by demonstrating a preimage $s\in \mathbb{F}_p^n$ such that $\mathcal{P}(s)=t$, for a ...
user404920's user avatar
3 votes
0 answers
64 views

UOV and SNOVA are two multivariate digital signatures that are currently considered by NIST for potential standardization. They are based on the hardness of solving a set of multivariate quadratic ...
user2249675's user avatar
2 votes
0 answers
61 views

Let's say there's an application that require a public-key permutation, and we can throw all other requirements away, and design one out of reciprocal multivariate system. Is this viable? If yes, how ...
DannyNiu's user avatar
  • 11.5k
0 votes
1 answer
81 views

# sage F=GF(2^8,'a') R=PolynomialRing(F,"x,y") R.inject_variables() f=x*y-1 How can we transform $f$ into multivariable Boolean polynomials over $\...
mini minions's user avatar
3 votes
1 answer
154 views

IN UOV schemes, I understand that you need to choose a secret subspace $O \in \mathcal{F}^q_n$ such that $P(\mathbf{o}) = 0$ for all $\mathbf{o} \in O$. According to the paper Improved cryptanalysis ...
BlockchainThomas's user avatar
1 vote
1 answer
212 views

I am looking for examples post-quantum secure trapdoor functions. Ideally, the inversion knowing the trapdoor should be "simple" in the sense that it can be computed by a circuit in NC^1.
Mjf T's user avatar
  • 21
1 vote
2 answers
85 views

Say that in $\mathbb{F}_{999,999,000,001}$ I have an equation $0 = ax - b$ where $a$ and $b$ are random values from the field. Is it possible to solve this equation for $x$ using the Extended ...
vimwitch's user avatar
  • 139
1 vote
0 answers
54 views

I have a question regarding William Wang's paper Shorter Signatures from MQ. According to him the (maximum) signature size is: $$ 2\kappa + 3\kappa\cdot \lceil\tau\log\frac{M}{\tau}\rceil + \tau\cdot\...
miraunpajaro's user avatar
2 votes
1 answer
131 views

Let $\mathbb{F}_q$ be a finite field of size $q$ (prime), and $\mathbb{F}_{q^n}$ be a degree-$n$ algebraic extension of $\mathbb{F}_q$. Let $F$ be a polynomial function $\mathbb{F}_{q^n} \to \mathbb{F}...
Myath's user avatar
  • 966
2 votes
1 answer
634 views

Let $L$ be an $[n,k]$ code. A $k\times n$ matrix $G$ whose rows form a basis for $L$ is called a generator matrix for $L$. A linear $[n,k,d]$ code with largest possible minimum distance is called ...
Laba Sa's user avatar
  • 23
6 votes
3 answers
2k views

The mathematical problems used for Post-Quantum Cryptography problems I came across, are NP-complete, e.g. Solving quadratic equations over finite fields short lattice vectors and close lattice ...
Marc's user avatar
  • 327
4 votes
5 answers
6k views

I'm a student of Masters in Cyber Security. I have a habit to understand things from their first principles (at the very beginning). Kindly use any simple mathematical example to answer because I have ...
Zain's user avatar
  • 57
0 votes
0 answers
208 views

I am trying to understand XL algorithm and F4/F5 algorithms for solving multivariate polynomial systems. Is XL related to the Grobner basis? I would be grateful if anyone could suggest me the topics (...
Kunal's user avatar
  • 21
1 vote
1 answer
122 views

In code-based public key encryption schemes, a public key is formed by matrix-multiplying 2 linear matrices to the left and right side of a easily decodeable error-correcting code, so that it'll be ...
DannyNiu's user avatar
  • 11.5k

15 30 50 per page