Abstract
Let K be a commutative ring and K n be an affine space over K of dimension n. We illustrate the concept of a family of polynomially compressed multivariate maps f(n) by relations of degree k with invertible decomposition via presentation of the explicit construction. Such a construction is based on the edge transitive family of graphs D(n, K). It uses the equations of connected component of the graph. The walk on the graph can be given by the sequence of its edges. It induces a cubical bijective transformation E(n) of the flag space isomorphic to K n + 1. The transformations related edges of the walk form invertible decomposition of E(n) into simple multipliers. Knowledge of such decomposition allows to find the pre-image of E(n)(x) fast. The map E(n) is not suitable for a public map because its inverse is also cubical. The restriction of the map \(\tilde{E(n)}\) on the chosen connected component is a multivariate transformation of unbounded degree (compressed map). The public user has some additional compression rules which allow for fast computation of the value \(\tilde{E(n)}\) on a given flag. The key holder (Alice) knows E(n), special decompression rules allow her to decrypt fast. To hide the graph Alice deformates E(n), the compression and decompression rules by two special affine transformations τ 1 and τ 2. The usage of τ 1 E(n)τ 2 allows to get a more densely compressed map.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bollobás, B.: Extremal Graph Theory. Academic Press, London (1978)
Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. Advances in Information Security, vol. 25, p. 260. Springer (2006)
Ding, J., Yang, B.-Y.: Multivariate Public-Key Cryptography. In: Post-Quantum Cryptography, pp. 193–241. Springer (2009)
Imai, H., Matsumoto, T.: Algebraic methods for constructing asymmetric cryptosystems. In: Calmet, J. (ed.) AAECC 1985. LNCS, vol. 229, pp. 108–119. Springer, Heidelberg (1986)
Kipnis, A., Shamir, A.: Cryptanalysis of the oil & vinegar signature scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 257–266. Springer, Heidelberg (1998)
Klisowski, M., Ustimenko, V.: On the Comparison of Cryptographical Properties of Two Different Families of Graphs with Large Cycle Indicator. Mathematics in Computer Science 2, 181–198 (2012)
Kotorowicz, J., Ustimenko, V.: On the implementation of cryptoalgorithms based on algebraic graphs over some commutative rings. Special Issue: Proceedings of the International Conferences: Infinite Particle Systems, Complex Systems Theory and its Application, Kazimerz Dolny, Poland (2006), Condenced Matters Physics 11(2(54)), 347–360 (2008)
Lubotsky, A., Philips, R., Sarnak, P.: Ramanujan graphs. J. Comb. Theory 115, 62–89 (1989)
Lazebnik, F., Ustimenko, V., Woldar, A.J.: A New Series of Dense Graphs of High Girth. J.Bull. Amer. Math. Soc. 32, 73–79 (1995)
Lazebnik, F., Ustimenko, V.: Explicit construction of graphs with arbitrary large girth and of large size. Discrete Applied Mathematics 60, 275–284 (1995)
Margulis, G.: Explicit group-theoretical constructions of combinatorial schemes and their application to desighn of expanders and concentrators. J. Probl. Peredachi Informatsii. 24(1), 51–60 (1988); English translation publ. Journal of Problems of Information Transmission, 39–46
Romańczuk, U., Ustimenko, V.: On regular forests given in terms of algebraic geometry, new families of expanding graphs with large girth and new multivariate cryptographical algorithms. In: Proceedings of International Conference: Applications of Computer Algebra, Malaga, 135–139 (2013)
Shamir, A.: Efficient signature schemes based on birational permutations. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 1–12. Springer, Heidelberg (1994)
Ustimenko, V.: Coordinatisation of Trees and their Quotients. In: The “Voronoj’s Impact on Modern Science”. Kiev, Institute of Mathematics, vol. 2, pp. 125–152 (1998)
Ustimenko, V.: CRYPTIM: Graphs as Tools for Symmetric Encryption. In: Bozta, S., Sphparlinski, I. (eds.) AAECC 2001. LNCS, vol. 2227, pp. 278–287. Springer, Heidelberg (2001)
Ustimenko, V.: Graphs with special arcs and cryptography. Acta Applicandae Mathematicae (Kluwer) 74, 117–153 (2002)
Ustimenko, V.: Maximality of affine group and hidden graph cryptosystems. J. Algebra Discrete Math. (1), 133–150 (2005)
Ustimenko, V.: On the cryptographical properties of extreme algebraic graphs. In: Algebraic Aspects of Digital Communications. Lectures of Advanced NATO Institute, NATO Science for Peace and Security Series - D: Information and Communication Security, vol. 24, p. 296. IOS Press (2009)
Ustimenko, V.: On the extremal graph theory for directed graphs and its cryptographical applications. In: Shaska, T., Huffman, W.C., Joener, D., Ustimenko, V. (eds.) Advances in Coding Theory and Cryptography, Series on Coding and Cryptology, vol. 3, pp. 181–200 (2007)
Ustimenko, V.: Algebraic groups an small world graphs of high girth. Albanian Journal of Mathematics 3, 25–33 (2009)
Ustimenko, V., Romańczuk, U.: On Dynamical Systems of Large Girth or Cycle Indicator and their applications to Multivariate Cryptography. In: Yang, X.-S. (ed.) Artificial Intelligence, Evolutionary Computing and Metaheuristics. SCI, vol. 427, pp. 231–256. Springer, Heidelberg (2013)
Ustimenko, V.: Wróblewska, A.: On some algebraic aspects of data security in cloud computing. In: Proceedings of International Conference: Applications of Computer Algebra, Malaga, pp. 144–147 (2013)
Ustimenko V., Wróblewska, A.: On the key exchange encryption with nonlinear multivariate maps of stable degree. Annales UMCS (Informatica) (accepted for publication, 2014)
Wróblewska, A.: On some properties of graph based public keys. NATO Advanced Studies Institute: New challenges in digital communications. Albanian Journal of Mathematics 2(3), 229–234 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Romańczuk-Polubiec, U., Ustimenko, V. (2014). On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition. In: Kotulski, Z., Księżopolski, B., Mazur, K. (eds) Cryptography and Security Systems. CSS 2014. Communications in Computer and Information Science, vol 448. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44893-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-662-44893-9_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44892-2
Online ISBN: 978-3-662-44893-9
eBook Packages: Computer ScienceComputer Science (R0)