Skip to main content

On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition

  • Conference paper
Book cover Cryptography and Security Systems (CSS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 448))

Included in the following conference series:

  • 1077 Accesses

Abstract

Let K be a commutative ring and K n be an affine space over K of dimension n. We illustrate the concept of a family of polynomially compressed multivariate maps f(n) by relations of degree k with invertible decomposition via presentation of the explicit construction. Such a construction is based on the edge transitive family of graphs D(n, K). It uses the equations of connected component of the graph. The walk on the graph can be given by the sequence of its edges. It induces a cubical bijective transformation E(n) of the flag space isomorphic to K n + 1. The transformations related edges of the walk form invertible decomposition of E(n) into simple multipliers. Knowledge of such decomposition allows to find the pre-image of E(n)(x) fast. The map E(n) is not suitable for a public map because its inverse is also cubical. The restriction of the map \(\tilde{E(n)}\) on the chosen connected component is a multivariate transformation of unbounded degree (compressed map). The public user has some additional compression rules which allow for fast computation of the value \(\tilde{E(n)}\) on a given flag. The key holder (Alice) knows E(n), special decompression rules allow her to decrypt fast. To hide the graph Alice deformates E(n), the compression and decompression rules by two special affine transformations τ 1 and τ 2. The usage of τ 1 E(n)τ 2 allows to get a more densely compressed map.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bollobás, B.: Extremal Graph Theory. Academic Press, London (1978)

    MATH  Google Scholar 

  2. Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. Advances in Information Security, vol. 25, p. 260. Springer (2006)

    Google Scholar 

  3. Ding, J., Yang, B.-Y.: Multivariate Public-Key Cryptography. In: Post-Quantum Cryptography, pp. 193–241. Springer (2009)

    Google Scholar 

  4. Imai, H., Matsumoto, T.: Algebraic methods for constructing asymmetric cryptosystems. In: Calmet, J. (ed.) AAECC 1985. LNCS, vol. 229, pp. 108–119. Springer, Heidelberg (1986)

    Chapter  Google Scholar 

  5. Kipnis, A., Shamir, A.: Cryptanalysis of the oil & vinegar signature scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 257–266. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  6. Klisowski, M., Ustimenko, V.: On the Comparison of Cryptographical Properties of Two Different Families of Graphs with Large Cycle Indicator. Mathematics in Computer Science 2, 181–198 (2012)

    Article  MathSciNet  Google Scholar 

  7. Kotorowicz, J., Ustimenko, V.: On the implementation of cryptoalgorithms based on algebraic graphs over some commutative rings. Special Issue: Proceedings of the International Conferences: Infinite Particle Systems, Complex Systems Theory and its Application, Kazimerz Dolny, Poland (2006), Condenced Matters Physics 11(2(54)), 347–360 (2008)

    Google Scholar 

  8. Lubotsky, A., Philips, R., Sarnak, P.: Ramanujan graphs. J. Comb. Theory 115, 62–89 (1989)

    Google Scholar 

  9. Lazebnik, F., Ustimenko, V., Woldar, A.J.: A New Series of Dense Graphs of High Girth. J.Bull. Amer. Math. Soc. 32, 73–79 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  10. Lazebnik, F., Ustimenko, V.: Explicit construction of graphs with arbitrary large girth and of large size. Discrete Applied Mathematics 60, 275–284 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  11. Margulis, G.: Explicit group-theoretical constructions of combinatorial schemes and their application to desighn of expanders and concentrators. J. Probl. Peredachi Informatsii. 24(1), 51–60 (1988); English translation publ. Journal of Problems of Information Transmission, 39–46

    MathSciNet  Google Scholar 

  12. Romańczuk, U., Ustimenko, V.: On regular forests given in terms of algebraic geometry, new families of expanding graphs with large girth and new multivariate cryptographical algorithms. In: Proceedings of International Conference: Applications of Computer Algebra, Malaga, 135–139 (2013)

    Google Scholar 

  13. Shamir, A.: Efficient signature schemes based on birational permutations. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 1–12. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  14. Ustimenko, V.: Coordinatisation of Trees and their Quotients. In: The “Voronoj’s Impact on Modern Science”. Kiev, Institute of Mathematics, vol. 2, pp. 125–152 (1998)

    Google Scholar 

  15. Ustimenko, V.: CRYPTIM: Graphs as Tools for Symmetric Encryption. In: Bozta, S., Sphparlinski, I. (eds.) AAECC 2001. LNCS, vol. 2227, pp. 278–287. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  16. Ustimenko, V.: Graphs with special arcs and cryptography. Acta Applicandae Mathematicae (Kluwer) 74, 117–153 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  17. Ustimenko, V.: Maximality of affine group and hidden graph cryptosystems. J. Algebra Discrete Math. (1), 133–150 (2005)

    MathSciNet  Google Scholar 

  18. Ustimenko, V.: On the cryptographical properties of extreme algebraic graphs. In: Algebraic Aspects of Digital Communications. Lectures of Advanced NATO Institute, NATO Science for Peace and Security Series - D: Information and Communication Security, vol. 24, p. 296. IOS Press (2009)

    Google Scholar 

  19. Ustimenko, V.: On the extremal graph theory for directed graphs and its cryptographical applications. In: Shaska, T., Huffman, W.C., Joener, D., Ustimenko, V. (eds.) Advances in Coding Theory and Cryptography, Series on Coding and Cryptology, vol. 3, pp. 181–200 (2007)

    Google Scholar 

  20. Ustimenko, V.: Algebraic groups an small world graphs of high girth. Albanian Journal of Mathematics 3, 25–33 (2009)

    MATH  MathSciNet  Google Scholar 

  21. Ustimenko, V., Romańczuk, U.: On Dynamical Systems of Large Girth or Cycle Indicator and their applications to Multivariate Cryptography. In: Yang, X.-S. (ed.) Artificial Intelligence, Evolutionary Computing and Metaheuristics. SCI, vol. 427, pp. 231–256. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  22. Ustimenko, V.: Wróblewska, A.: On some algebraic aspects of data security in cloud computing. In: Proceedings of International Conference: Applications of Computer Algebra, Malaga, pp. 144–147 (2013)

    Google Scholar 

  23. Ustimenko V., Wróblewska, A.: On the key exchange encryption with nonlinear multivariate maps of stable degree. Annales UMCS (Informatica) (accepted for publication, 2014)

    Google Scholar 

  24. Wróblewska, A.: On some properties of graph based public keys. NATO Advanced Studies Institute: New challenges in digital communications. Albanian Journal of Mathematics 2(3), 229–234 (2008)

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Romańczuk-Polubiec, U., Ustimenko, V. (2014). On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition. In: Kotulski, Z., Księżopolski, B., Mazur, K. (eds) Cryptography and Security Systems. CSS 2014. Communications in Computer and Information Science, vol 448. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44893-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44893-9_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44892-2

  • Online ISBN: 978-3-662-44893-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics