Progress in multivariate cryptography: Systematic review, challenges, and research directions

J Dey, R Dutta - ACM Computing Surveys, 2023 - dl.acm.org
Multivariate Public Key Cryptosystem (MPKC) seem to be promising toward future digital
security even in the presence of quantum adversaries. MPKCs derive their security from the …

Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey

S Kumari, M Singh, R Singh… - Software: Practice and …, 2022 - Wiley Online Library
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …

On the security of multivariate-based ring signature and other related primitives

V Srivastava, SK Debnath, SK Tiwari… - Journal of Information …, 2023 - Elsevier
The multivariate public-key cryptography (MPKC) provides a promising class of post-
quantum signature schemes. Its theoretical security comes from the intractability of the …

On Schubert cells of Projective Geometry and quadratic public keys of Multivariate Cryptography

V Ustimenko - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Jordan-Gauss graphs are bipartite graphs given by special quadratic equations over the
commutative ring K with unity with partition sets K^ n and K^ m, n≥ m such that the …

On historical Multivariate Cryptosystems and their restorations as instruments of Post-Quantum Cryptography

V Ustimenko - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The paper presents a short survey of the History of Multivariate Cryptography together with
the usage of old broken multivariate digital signatures in the new protocol based …

On the Jordan-Gauss graphs and new multivariate public keys

V Ustimenko, T Chojecki, A Wróblewska - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We suggest two families of multivariate public keys defined over arbitrary finite commutative
ring\(K\) with unity. The first one has quadratic multivariate public rule, this family is an …

On short digital signatures with Eulerian transformations

V Ustimenko - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Let n stands for the length of digital signatures with quadratic multivariate public rule in n
variables. We construct postquantum secure procedure to sign O (n^ t), t≥ 1 digital …

On the Restoration of Historical Matsumoto-Imai Cryptosystem and Other Schemes in Terms of Noncommutative Cryptography

V Ustimenko - Proceedings of the Future Technologies Conference, 2024 - Springer
Abstract Matsumoto-Imai Cryptosystem was one of the first public keys developed in terms of
Multivariate Cryptography. The famous effective cryptanalysis of this system and various …

Multivariate Cryptosystem Based on a Quadratic Equation to Eliminate the Outliers Using Homomorphic Encryption Scheme

M Janani, R Jeevitha, R Jaikumar, R Suganthi… - … Encryption for Financial …, 2023 - Springer
Due to the development of powerful quantum computers, traditional public-key methods are
vulnerable because they depend on number theory. Post-quantum cryptography candidates …

[HTML][HTML] A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security

Y Wang, L Li, Y Zhou, H Zhang - Axioms, 2024 - mdpi.com
The RSA cryptosystem has been a cornerstone of modern public key infrastructure;
however, recent advancements in quantum computing and theoretical mathematics pose …