Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
Advances in Information Security

Multivariate Public Key Cryptosystems

Jintai Ding 및 다른 저자
    • US$149.99
    • US$149.99

출판사 설명

This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most important multivariate public key schemes, including the four multivariate signature schemes participating as second round candidates in the NIST standardization process for post-quantum cryptosystems. Furthermore, this book covers the Simple Matrix encryption scheme, which is currently the most promising multivariate public key encryption scheme. This book also covers the current state of security analysis methods for Multivariate Public Key Cryptosystems including the algorithms and theory of solving systems of multivariate polynomial equations over finite fields. Through the book’s website, interested readers can find source code to the algorithms handled in this book.
In 1994, Dr. Peter Shor from Bell Laboratories proposed a quantum algorithm solving the Integer Factorization and the Discrete Logarithm problem in polynomial time, thus making all of the currently used public key cryptosystems, such as RSA and ECC insecure. Therefore, there is an urgent need for alternative public key schemes which are resistant against quantum computer attacks. Researchers worldwide, as well as companies and governmental organizations have put a tremendous effort into the development of post-quantum public key cryptosystems to meet this challenge. One of the most promising candidates for this are Multivariate Public Key Cryptosystems (MPKCs). The public key of an MPKC is a set of multivariate polynomials over a small finite field. Especially for digital signatures, numerous well-studied multivariate schemes offering very short signatures and high efficiency exist. The fact that these schemes work over small finite fields, makes them suitable not only for interconnected computer systems,but also for small devices with limited resources, which are used in ubiquitous computing.
This book gives a systematic introduction into the field of Multivariate Public Key Cryptosystems (MPKC), and presents the most promising multivariate schemes for digital signatures and encryption. Although, this book was written more from a computational perspective, the authors try to provide the necessary mathematical background. Therefore, this book is suitable for a broad audience. This would include  researchers working in either computer science or mathematics interested in this exciting new field, or as a secondary textbook for a course in MPKC suitable for beginning graduate students in mathematics or computer science. Information security experts in industry, computer scientists and mathematicians would also find  this book valuable as a guide for understanding the basic mathematical structures necessary to implement multivariate cryptosystems for practical applications.

장르
컴퓨터 및 인터넷
출시일
2020년
9월 30일
언어
EN
영어
길이
278
페이지
출판사
Springer US
판매자
Springer Nature B.V.
크기
10.5
MB
Post-Quantum Cryptography Post-Quantum Cryptography
2021년
Arithmetic of Finite Fields Arithmetic of Finite Fields
2007년
Mathematical Methods in Computer Science Mathematical Methods in Computer Science
2008년
Post-Quantum Cryptography Post-Quantum Cryptography
2008년
Advances in Cryptology – EUROCRYPT 2022 Advances in Cryptology – EUROCRYPT 2022
2022년
Candidate Multilinear Maps Candidate Multilinear Maps
2015년
Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
2006년
Post-Quantum Cryptography Post-Quantum Cryptography
2008년
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009년
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016년
Security for Telecommunications Networks Security for Telecommunications Networks
2008년
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007년
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015년
Network Security Policies and Procedures Network Security Policies and Procedures
2007년