K. Akiyama, Shuhei Nakamura, Masaru Ito, Noriko Hirata-Kohno
{"title":"一种基于多项式映射的密钥交换协议","authors":"K. Akiyama, Shuhei Nakamura, Masaru Ito, Noriko Hirata-Kohno","doi":"10.1142/S2661335219500035","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a key exchange protocol using multivariate polynomial maps whose security relies on the hardness in finding a solution to a certain system of nonlinear polynomial equations. Under the hardness assumption of solving the system of equations, we prove that our protocol is secure against key recovery attacks by passive attackers if the protocol is established honestly.","PeriodicalId":34218,"journal":{"name":"International Journal of Mathematics for Industry","volume":"11 1","pages":""},"PeriodicalIF":0.3000,"publicationDate":"2019-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A key exchange protocol relying on polynomial maps\",\"authors\":\"K. Akiyama, Shuhei Nakamura, Masaru Ito, Noriko Hirata-Kohno\",\"doi\":\"10.1142/S2661335219500035\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a key exchange protocol using multivariate polynomial maps whose security relies on the hardness in finding a solution to a certain system of nonlinear polynomial equations. Under the hardness assumption of solving the system of equations, we prove that our protocol is secure against key recovery attacks by passive attackers if the protocol is established honestly.\",\"PeriodicalId\":34218,\"journal\":{\"name\":\"International Journal of Mathematics for Industry\",\"volume\":\"11 1\",\"pages\":\"\"},\"PeriodicalIF\":0.3000,\"publicationDate\":\"2019-06-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Mathematics for Industry\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1142/S2661335219500035\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"MATHEMATICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Mathematics for Industry","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/S2661335219500035","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
A key exchange protocol relying on polynomial maps
In this paper, we propose a key exchange protocol using multivariate polynomial maps whose security relies on the hardness in finding a solution to a certain system of nonlinear polynomial equations. Under the hardness assumption of solving the system of equations, we prove that our protocol is secure against key recovery attacks by passive attackers if the protocol is established honestly.