A NEW SCHEME BASED ON THE MI SCHEME AND ITS ANALYSIS

来源 :Journal of Electronics(China) | 被引量 : 0次 | 上传用户:zy15400444
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our new scheme, named the Multi-layer MI (MMI) scheme, has a structure of multi-layer central map. Firstly, this article introduces the MI scheme and describes linearization attack and differential attack; then prescribes the designation of MMI in detail, and proves that MMI can resist both linearization attack and differential attack. Besides, this article also proves that MMI can resist recent eXtended Linearization (XL)-like methods. In the end, this article concludes that MMI also maintains the efficiency of MI. This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our new scheme, named the Multi-layer MI (MMI) scheme, has a structure of multi-layer central map. Firstly, this article introduces the MI scheme and describes linearization attack and differential attack; then prescribes the designation of MMI in detail, and proves that MMI can resist both linearization attack and differential attack. Besides, this article also proves that MMI can resist recent eXtended Linearization (XL) -like methods. In the end, this article concludes that MMI also maintains the efficiency of MI.
其他文献
Passive radar detects moving targets by Cross Ambiguity Function (CAF), which is based on the cross correlation process of the direct-path signal in reference c
世界只有一个邮政网,邮政将世界紧密相连。由电子商务、IP电话局、政府上网、网上教育、网上邮局等组成的网络信息中心正带动邮政信息化的新一轮革命。从自助邮局到自助银行,从网
本文介绍了微波防护纺织品屏蔽原理以及屏蔽效果的测试,指出微波防护纺织品的防护效果是有效的,并说明了在使用防护用品时应注意的问题.
空闲的午后,带着开始僵硬的脖颈,离开令人麻木的办公室,我常坐进茶室,来到音乐和陌生人中间,寻求那种置身人外又保持距离的温暖和自由。点上一壶菊花清茶,看着盈盈花茶,用嘴
本文提出了一种基于信誉机制的P2P网络,以量化的信誉度值来判断节点的合法性;给出了该网络的运行机制及恶意节点的检测和处理方式。
Precoding methods at the Base Station (BS) can be used to deal with the inter-cell interference and improve the signal quality of the user especially at the cel
伍德夫妇去年就委托一家房地产代理商帮他们卖掉住了25年的老房子以便告老还乡.但事情进展得很不顺利.代理商告诉他们:房子本身的条件是相当不错的,但买主们一听说地处繁华街
This paper presents a novel way to improve Transmission Control Protocol (TCP) performance of the users at the edge areas of the macro cells in Long Term Evolut
凡事皆有宜忌,当行则行,当止则止。饮酒亦不例外。饮酒讲究科学,方能有利于养生益寿,否则,滥饮无度,不知进退,有害无益。 饮酒有哪些禁忌呢? (1)忌饮酒过量古书中记载“饮酒
A Two-hop Wireless Network (TWN) is the basic topology structure that provides network coding opportunity for improving throughput. Network coding on a homogene