期刊文献+

基于遍历矩阵的单向(陷门)函数的构造方案 被引量:7

Scheme to Construct One-Way(Trapdoor) Functions Based on Ergodic Matrices
在线阅读 下载PDF
导出
摘要 针对基于特定非交换壹半群(m,.)中的困难问题,给出了单向(陷门)函数的一种新的构造方案,即已知A和B=xAy,而求x和y的难度;选取有限域Fq上的n×n矩阵,在Fq矩阵乘法下,以所构成的非交换壹半群作为研究对象,利用Fq上“遍历矩阵”的密码学特性,提出了基于Fq上遍历矩阵的实现方案,并对可能的攻击手段进行了分析。提出了“强壮矩阵”的概念,并对给定的两个遍历矩阵Q1和Q2,给出了关于Q1,Q2的强壮矩阵的判别标准和寻找算法;由〈Q1〉,〈Q2〉以及关于Q1,Q2的强壮矩阵,可以构造相应的单向(陷门)函数。 We present a new implementation of the one-way (trapdoor) functions. It is based on the difficult problem in a specific monoid ( m, · ) which is noncommutative, namely the difficulty to deduce x and y by knowing A and B = xAy. So we focus on certain monoid which is formed by all the n x n matrices over finite field Fq under multiplication. By the cryptography characteristics of "ergodic matrix" based on the ergodic matrices over Fq and then analyze the possible attacks. over Fq, we scheme out a method Then we introduce the concept of "strong matrix" and provide distinguishing criterion and search algorithm of the strong matrix about two certain ergodic matrices Q1 and Q2- Using 〈Q1 〉, 〈 Q2 〉 and a strong matrix m about Q1 and Q2, we can construct a one-way (trapdoor) function.
出处 《吉林大学学报(信息科学版)》 CAS 2006年第5期555-560,共6页 Journal of Jilin University(Information Science Edition)
关键词 遍历矩阵 强壮矩阵 有限域 ergodic matrix strong matrix finite field
  • 相关文献

参考文献7

  • 1ZHAO Yong-zhe,WANG Li-ou,ZHANG Wei.Information-Exchange Using the Ergodic Matrices in GF (2).Applied Cryptography and Network Security Technical Track Proceedings[ C ] //2nd International Conference,ACNS 2004.China Huangshan:ICISA Press,2004:388-397.
  • 2赵永哲,黄声烈,姜占华.GF(2^k)上的遍历矩阵及其特性分析[J].小型微型计算机系统,2005,26(12):2135-2139. 被引量:14
  • 3BRUCE SCHNEIER.Applied Cryptography:Protocols,Algorithms,and Source Code in C[ M].2nd Edition.New York,USA:John Wiley & Sons Inc,1996.
  • 4LIDL R,NIEDERREITER H.Introduction to Finite Fields and Their Applications[ M].Cambridge UK:Cambridge University Press,1994.
  • 5NICOLAS T.Courtois and Jacques Patarin,About the XL Algorithm over GF (2)[ C ] // Cryptographers'Track RSA.Heidelberg:Springer-Verlag,2003:13-17.
  • 6JEAN-CHARLES FAUG' ERE,JOUX A.Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptsystems Using Grobner Bases[ C] // Crypto 2003,LNCS 2729.Heidelberg:Springer-Verlag,2003:44-60.
  • 7NICOLAS COURTOIS.The Security of Hidden Field Equations (HFE)[ C ] //Cryptographers'Track RSA Conference 2001.Heidelberg:Springer-Verlag,2001:266-281.

二级参考文献13

  • 1Theresa Migler, Kent E Morrison,Mitchell Ogle. Weight and rank of matrices over finite fields [Z]. arXiv:math. RA/0403314,vl 18, Mar. 2004.
  • 2Tromp J, Zhang L, Zhao Y. Small weight bases for Hamming codes [J]. TheoreticalComputer Science, 1997, 181 (2): 337-345.
  • 3Johannes Bl mer, Richard Karp, Emo Welzl. The rank of sparse random matrices overfinite fields [J]. Random Structures and Algorithms,July 1997, 10(4) :407-419.
  • 4Cooper C. On the distribution of rank of a random matrix over a finite field[J]. RandomStructures and Algorithms, Oct. -Dec.,2000,17(3-4): 197-212.
  • 5Menezes A J, Blake I F, Gao X et al. Applications of finite fields[M]. Kluwer Academic,1993.
  • 6Lidl R, Niederreiter H. Introduction to finite fields and their applications[M].Cambridge: University Press, 1994.
  • 7Dougherty S T, Shiromoto K. Maximum distance codes over rings of order 4[J]. IEEETrans. Inform. Theory, 2001,47(1):400-404.
  • 8Horimoto H, Shiromoto K. On generalized Hamming weights for codes over finite chainrings[J]. Lecture Notes in Computer Science, 2001,2227:141-150.
  • 9Li Zhen-yang, Ke Fei-chen. On the orders of transformation matrices(mod n) and twotypes of generalized Arnold transformation matrices [EB/OL]. http://cis. sjtu. edu.cn/personal/yanglizhen/matrix-eng. pdf
  • 10Ezra Brown, Theresa P. Vaughan, Cycles of directed graphs defined by matrixmultiplication (mod n)[J]. Discrete Mathematics 2001, 239:109-120.

共引文献13

同被引文献29

引证文献7

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部