Polynomial equivalence problems and applications to multivariate cryptosystems

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

At Eurocrypt'96, J.Patarin proposed a signature and authentication scheme whose security relies on the difficulty of the Isomorphism of Polynomials problem [P]. In this paper, we study a variant of this problem, namely the Isomorphism of Polynomials with one secret problem and we propose new algorithms to solve it, which improve on all the previously known algorithms. As a consequence, we prove that, when the number of polynomials (u) is close to the number of variables (n), the instances considered in [P] and [P1] can be broken. We point out that the case n - u small is the most relevant one for cryptographic applications. Besides, we show that a large class of instances that have been presumed difficult in [P] and [P1] can be solved in deterministic polynomial time. We also give numerical results to illustrate our methods.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsThomas Johansson, Subhamoy Maitra
PublisherSpringer Verlag
Pages235-251
Number of pages17
ISBN (Print)3540206094, 9783540206095
DOIs
Publication statusPublished - 1 Jan 2003

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2904
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Gröbner Bases
  • Isomorphism of Polynomials
  • Multivariate polynomial equations

Fingerprint

Dive into the research topics of 'Polynomial equivalence problems and applications to multivariate cryptosystems'. Together they form a unique fingerprint.

Cite this