2006
DOI: 10.1007/11818175_20
|View full text |Cite
|
Sign up to set email alerts
|

Inverting HFE Is Quasipolynomial

Abstract: Abstract. In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably, the HFE scheme [17] appears to combine efficiency and resistance to attacks, as expected from any public key scheme. However, its security is not yet completely understood. On one hand, since the security is related to the hardness of solving quadratic systems of multivariate binary equations, an NP complete problem, there… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

4
65
0
3

Year Published

2009
2009
2020
2020

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(72 citation statements)
references
References 14 publications
4
65
0
3
Order By: Relevance
“…Solving HFE directly is considered to be sub-exponential [22], and a "standard" HFE implementation for 2 80 security works over F 2 103 with degree d = 129. We know of no timings below 100 million cycles on a modern processor like a Core 2.…”
Section: Hidden Field Equation (Hfe) Encryption Schemesmentioning
confidence: 99%
“…Solving HFE directly is considered to be sub-exponential [22], and a "standard" HFE implementation for 2 80 security works over F 2 103 with degree d = 129. We know of no timings below 100 million cycles on a modern processor like a Core 2.…”
Section: Hidden Field Equation (Hfe) Encryption Schemesmentioning
confidence: 99%
“…This line of research dates back to the mid eighties with the design of C * [35], later followed by many other proposals, e.g., [44,30,14,41,28,49,50]. While this family of designs is commonly considered to be an interesting alternative to constructions based on number-theoretic problems (in the post-quantum setting), it suffers from a lack of clear security reductions to well-understood problems, leading to a series of attacks, e.g., [29,13,18,24,20,17,19,15].…”
Section: Introductionmentioning
confidence: 99%
“…The notions of degree of regularity and semi-regularity in [2] can be generalized to the case when q is odd. However, the asymptotic analysis on which the results of [15] depend, has not yet been generalized to this situation. The work in [11] seemed to suggest that HFE systems over a field of odd characteristic could resist the attack of Gröbner basis algorithms even when D is small.…”
Section: Introductionmentioning
confidence: 99%
“…A breakthrough in case of general q came in the recent work of Dubois and Gama [12]. They first refined and gave a rigorous mathematical foundation for the arguments in [15]. They then derived a new method to compute the degree of regularity over any field similar to that in [2].…”
Section: Introductionmentioning
confidence: 99%