Analysis of a Public Key Approach Based on Polynomial Substitution

43Citations
Citations of this article
42Readers
Mendeley users who have this article in their library.

Abstract

We set out to build a public key cryptosystem by repeatedly substituting for variables in multivariate polynomials and simplifying the results to conceal the substitution process. There seems, however, to be no way to build such a system that is both secure and has a public key of practical size when the devices used to limit the number of coefficeints are nilpotence and J-rings. We have only shown, however, that it is impossible to produce such a system if the total degree of the encryption polynomial determines the size of the public key. Perhaps, by properly choosing p 0 and p 1, we can employ the fundamental scheme to produce sparse encrypting polynomials. Then the public key could be kept small while the encrypting polynomial bas large total degree and is difficult to invert.

References Powered by Scopus

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems

12440Citations
N/AReaders
Get full text

New Directions in Cryptography

10614Citations
N/AReaders
Get full text

Hiding Information and Signatures in Trapdoor Knapsacks

575Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Public quadratic polynomial-tuples for efficient signature-verification and message-encryption

384Citations
N/AReaders
Get full text

Cryptanalysis of the HFE public key cryptosystem by relinearization

289Citations
N/AReaders
Get full text

Efficient signature schemes based on birational permutations

64Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Fell, H., & Diffie, W. (1986). Analysis of a Public Key Approach Based on Polynomial Substitution. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 218 LNCS, pp. 340–349). Springer Verlag. https://doi.org/10.1007/3-540-39799-X_24

Readers over time

‘10‘11‘12‘13‘14‘15‘16‘17‘18‘19‘20‘21‘22‘23‘2502468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 22

61%

Researcher 6

17%

Professor / Associate Prof. 5

14%

Lecturer / Post doc 3

8%

Readers' Discipline

Tooltip

Computer Science 27

73%

Mathematics 5

14%

Engineering 3

8%

Physics and Astronomy 2

5%

Save time finding and organizing research with Mendeley

Sign up for free
0