<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Multivariate_cryptography</id>
	<title>Multivariate cryptography - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Multivariate_cryptography"/>
	<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Multivariate_cryptography&amp;action=history"/>
	<updated>2026-05-06T18:30:19Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>http://debianws.lexgopc.com/wiki143/index.php?title=Multivariate_cryptography&amp;diff=6404293&amp;oldid=prev</id>
		<title>imported&gt;Citation bot: Add: date, authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Dominic3203 | Linked from User:LinguisticMystic/cs/outline | #UCB_webform_linked 1389/2277</title>
		<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Multivariate_cryptography&amp;diff=6404293&amp;oldid=prev"/>
		<updated>2025-04-17T02:58:26Z</updated>

		<summary type="html">&lt;p&gt;Add: date, authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. | &lt;a href=&quot;/wiki143/index.php?title=En:WP:UCB&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;En:WP:UCB (page does not exist)&quot;&gt;Use this bot&lt;/a&gt;. &lt;a href=&quot;/wiki143/index.php?title=En:WP:DBUG&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;En:WP:DBUG (page does not exist)&quot;&gt;Report bugs&lt;/a&gt;. | Suggested by Dominic3203 | Linked from User:LinguisticMystic/cs/outline | #UCB_webform_linked 1389/2277&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|Field of asymetric cryptographic primitives}}&lt;br /&gt;
{{More citations needed|date=February 2022}}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Multivariate cryptography&amp;#039;&amp;#039;&amp;#039; is the generic term for asymmetric [[Cryptography|cryptographic]] [[Cryptographic primitive|primitives]] based on [[Polynomial|multivariate polynomials]] over a [[finite field]] &amp;lt;math&amp;gt;F&amp;lt;/math&amp;gt;. In certain cases, those polynomials could be defined over both a ground and an extension [[Field (mathematics)|field]]. If the polynomials have  [[Degree of a polynomial|degree]] two, we talk about multivariate [[Quadratic polynomial|quadratics]]. Solving systems of multivariate [[Polynomial#Solving equations|polynomial equations]] is proven to be [[NP-complete]].&amp;lt;ref&amp;gt;{{Cite book|title=Computers and intractability : a guide to the theory of NP-completeness|last=Garey, Michael R.|date=1979|publisher=W.H. Freeman|others=Johnson, David S., 1945-|isbn=0-7167-1044-7|location=San Francisco|oclc=4195125}}&amp;lt;/ref&amp;gt;  That&amp;#039;s why those schemes are often considered to be good candidates for [[post-quantum cryptography]]. Multivariate cryptography has been very productive in terms of design and [[cryptanalysis]]. Overall, the situation is now more stable and the strongest schemes have withstood the test of time. It is commonly admitted that Multivariate cryptography turned out to be more successful as an approach to build [[Digital signature|signature schemes]]  primarily because multivariate schemes provide the shortest signature among post-quantum algorithms.&lt;br /&gt;
&lt;br /&gt;
== History ==&lt;br /&gt;
{{harvs|txt|last=Matsumoto | first=Tsutomu | last2=Imai | first2=Hideki | author2-link=Hideki Imai |year=1988}} presented their so-called C* scheme at the [[Eurocrypt]] conference. Although C* has been broken by {{harvs|txt|last=Patarin | first=Jacques|year=1995}}, the general principle of Matsumoto and Imai has inspired a generation of improved proposals. In later work, the &amp;quot;Hidden Monomial Cryptosystems&amp;quot; was developed by {{in lang|fr}} [[:fr:Jacques Patarin|Jacques Patarin]]. It is based on a ground and an extension field. &amp;quot;[[Hidden Field Equations]]&amp;quot; (HFE), developed by Patarin in 1996, remains a popular multivariate scheme today [P96]. The security of HFE has been thoroughly investigated, beginning with a direct [[Gröbner basis]] attack [FJ03, GJS06], key-recovery attacks {{harv|Kipnis|Shamir|1999}} [BFP13], and more. The plain version of HFE is considered to be practically broken, in the sense that secure parameters lead to an impractical scheme. However, some simple variants of HFE, such as the &amp;#039;&amp;#039;minus variant&amp;#039;&amp;#039; and the &amp;#039;&amp;#039;vinegar variant&amp;#039;&amp;#039; allow one to strengthen the basic HFE against all known attacks. &lt;br /&gt;
    &lt;br /&gt;
In addition to HFE, Patarin developed other schemes. In 1997 he presented “Balanced Oil &amp;amp; Vinegar” and in 1999 “[[Unbalanced Oil and Vinegar]]”, in cooperation with Aviad Kipnis and Louis Goubin {{harv|Kipnis|Patarin|Goubin|1999}}.&lt;br /&gt;
&lt;br /&gt;
==Construction==&lt;br /&gt;
Multivariate Quadratics involves a public and a private key. The private key consists of two affine transformations, S and T, and an easy to invert quadratic map &amp;lt;math&amp;gt;P&amp;#039; \colon F^m \rightarrow F^n&amp;lt;/math&amp;gt;. We denote the &amp;lt;math&amp;gt;n \times n&amp;lt;/math&amp;gt; matrix of the [[Affine transformation|affine]] [[endomorphism]]s&lt;br /&gt;
&amp;lt;math&amp;gt;S\colon F^n \rightarrow F^n&amp;lt;/math&amp;gt; by &amp;lt;math&amp;gt;M_S&amp;lt;/math&amp;gt; and the shift vector by &amp;lt;math&amp;gt;v_S \in F^n&amp;lt;/math&amp;gt; and similarly for &amp;lt;math&amp;gt;T\colon F^m \rightarrow F^m&amp;lt;/math&amp;gt;. In other words,&lt;br /&gt;
* &amp;lt;math&amp;gt;S(x) = M_S  x + v_S&amp;lt;/math&amp;gt; and&lt;br /&gt;
* &amp;lt;math&amp;gt;T(y) = M_T  y + v_T&amp;lt;/math&amp;gt;.&lt;br /&gt;
The triple &amp;lt;math&amp;gt;(S^{-1},{P&amp;#039;}^{-1},T^{-1})&amp;lt;/math&amp;gt; is the private key, also known as the trapdoor. The public key is the composition &amp;lt;math&amp;gt; P = S \circ P&amp;#039; \circ T&amp;lt;/math&amp;gt; which is by assumption hard to invert without the knowledge of the trapdoor.&lt;br /&gt;
&lt;br /&gt;
==Signature==&lt;br /&gt;
Signatures are generated using the private key and are verified using the public key as follows. The message is [[Hash function|hashed]] to a vector in &amp;lt;math&amp;gt; y \in F^n&amp;lt;/math&amp;gt; via a known hash function. The signature is &lt;br /&gt;
:&amp;lt;math&amp;gt; x=P^{-1}(y) = T^{-1} \left({P&amp;#039;}^{-1}\left(S^{-1}(y)\right)\right)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The receiver of the signed document must have the public key P in possession. He computes the hash &amp;lt;math&amp;gt;y&amp;lt;/math&amp;gt; and checks that the signature &amp;lt;math&amp;gt;x&amp;lt;/math&amp;gt; fulfils &amp;lt;math&amp;gt;P(x)=y&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
{{Unreferenced section|date=August 2018}}&lt;br /&gt;
* [[Unbalanced Oil and Vinegar]]&lt;br /&gt;
* [[Hidden Field Equations]]&lt;br /&gt;
* SFLASH by [[NESSIE]]&lt;br /&gt;
* Rainbow&lt;br /&gt;
* TTS&lt;br /&gt;
* QUARTZ&lt;br /&gt;
* [[QUAD (cipher)]]&lt;br /&gt;
* Four multivariate cryptography signature schemes (GeMMS, LUOV, Rainbow and MQDSS) have made their way into the 2nd round of the NIST post-quantum competition: see slide 12 of the report.&amp;lt;ref&amp;gt;{{cite web |last1=Moody |first1=Dustin |title=The 2nd Round of the NIST PQC Standardization Process |date=22 August 2019 |url=https://csrc.nist.gov/Presentations/2019/the-2nd-round-of-the-nist-pqc-standardization-proc |publisher=NIST |accessdate=11 October 2020}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [BFP13] L. Bettale,  [[Jean-Charles Faugère]], and  L. Perret, Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic. DCC&amp;#039;13&lt;br /&gt;
* [FJ03] [[Jean-Charles Faugère]] and  A. Joux, Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. CRYPTO&amp;#039;03&lt;br /&gt;
* [GJS06] L. Granboulan, Antoine Joux, J. Stern: Inverting HFE Is Quasipolynomial. CRYPTO&amp;#039;06.&lt;br /&gt;
* {{cite book | last1=Kipnis | first1=Aviad | last2=Shamir | first2=Adi | title=Advances in Cryptology – CRYPTO&amp;#039; 99 | chapter=Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization | publisher=Springer | location=Berlin, Heidelberg | year=1999 | isbn=978-3-540-66347-8 | issn=0302-9743 | doi=10.1007/3-540-48405-1_2 | mr=1729291}}&lt;br /&gt;
* {{cite conference |last1=Kipnis |first1=Aviad |last2=Patarin |first2=Jacques |last3=Goubin |first3=Louis |date=1999 |chapter=Unbalanced Oil and Vinegar Signature Schemes |conference=Eurocrypt&amp;#039;99 |editor=Jacques Stern |title=Advances in Cryptology – CRYPTO&amp;#039; 99 |publisher=Springer |isbn=3-540-65889-0 |issn=0302-9743 |doi=10.1007/3-540-48910-x_15 |mr=1717470 |chapter-url=https://link.springer.com/content/pdf/10.1007/3-540-48910-X_15.pdf|doi-access=free }}&lt;br /&gt;
* {{cite book | last1=Matsumoto | first1=Tsutomu | last2=Imai | first2=Hideki | author2-link=Hideki Imai |title=Lecture Notes in Computer Science | chapter=Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption | publisher=Springer  | location=Berlin, Heidelberg | year=1988 | isbn=978-3-540-50251-7 | issn=0302-9743 | doi=10.1007/3-540-45961-8_39 | mr=0994679}}&lt;br /&gt;
* {{cite book | last=Patarin | first=Jacques | title=Advances in Cryptology – CRYPT0&amp;#039; 95 | chapter=Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88 | series=Lecture Notes in Computer Science | publisher=Springer | location=Berlin, Heidelberg | year=1995 | volume=963 | pages=248–261 | isbn=978-3-540-60221-7 | issn=0302-9743 | doi=10.1007/3-540-44750-4_20 | mr=1445572}}&lt;br /&gt;
* [P96] Jacques Patarin, Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new Families of Asymmetric Algorithms (extended version); Eurocrypt &amp;#039;96&lt;br /&gt;
* Christopher Wolf and [[Bart Preneel]], Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations; Current Version: 2005-12-15&lt;br /&gt;
*An Braeken, Christopher Wolf, and [[Bart Preneel]], A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes, Current Version: 2005-08-06&lt;br /&gt;
*Jintai Ding, Research Project: Cryptanalysis on Rainbow and TTS multivariate public key signature scheme&lt;br /&gt;
*Jacques Patarin, [[Nicolas Courtois]], Louis Goubin, SFLASH, a fast asymmetric signature scheme for low-cost smartcards. Primitive specification and supporting documentation.&lt;br /&gt;
*Bo-Yin Yang, Chen-Mou Cheng, Bor-Rong Chen, and Jiun-Ming Chen, Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems, 2006&lt;br /&gt;
*Bo-Yin Yang, Jiun-Ming Chen, and Yen-Hung Chen, TTS: High-Speed Signatures on a Low-Cost Smart Card, 2004&lt;br /&gt;
*[[Nicolas Courtois|Nicolas T. Courtois]], Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash, 2005&lt;br /&gt;
*Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography, 1997&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
* [http://www.s1on1.com/main/index.cgi/000000A/http://www.minrank.org/hfe/] The HFE public key encryption and signature&lt;br /&gt;
* [http://www-polsys.lip6.fr/Links/hfeboost.html] HFEBoost&lt;br /&gt;
&lt;br /&gt;
{{Cryptography navbox}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Multivariate cryptography| ]]&lt;br /&gt;
[[Category:Post-quantum cryptography]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Citation bot</name></author>
	</entry>
</feed>