2019
DOI: 10.1142/s2661335219500035
|View full text |Cite
|
Sign up to set email alerts
|

A key exchange protocol relying on polynomial maps

Abstract: In this paper, we propose a key exchange protocol using multivariate polynomial maps whose security relies on the hardness in finding a solution to a certain system of nonlinear polynomial equations. Under the hardness assumption of solving the system of equations, we prove that our protocol is secure against key recovery attacks by passive attackers if the protocol is established honestly.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(13 citation statements)
references
References 3 publications
0
13
0
Order By: Relevance
“…Even if the system of equations has multiple solutions in F n q , the solution in Z n p will be unique with high probability, which enables the party to successfully determine the correct common key. Our proposed protocol with sizes of parameters q and n similar to those of [2] indeed reduces the failure probability significantly. Moreover, we propose a parameter set for our proposed protocol that might achieve both failure probability 2 −120 and 128-bit security level.…”
Section: Our Contributionsmentioning
confidence: 79%
See 4 more Smart Citations
“…Even if the system of equations has multiple solutions in F n q , the solution in Z n p will be unique with high probability, which enables the party to successfully determine the correct common key. Our proposed protocol with sizes of parameters q and n similar to those of [2] indeed reduces the failure probability significantly. Moreover, we propose a parameter set for our proposed protocol that might achieve both failure probability 2 −120 and 128-bit security level.…”
Section: Our Contributionsmentioning
confidence: 79%
“…In this paper, we give an improvement of the key exchange protocol by Akiyama et al [2] in reducing the failure probability while keeping the security level. Roughly speaking, in the improved version of Akiyama et al's protocol, one of the two parties solves a certain system of polynomial equations defined over a prime field F q in order to determine the common key.…”
Section: Our Contributionsmentioning
confidence: 99%
See 3 more Smart Citations