[1] DING J, YANG B. Multivariate public key cryptography[C]//PQC 2009: Proceedings of the 2009 Post-Quantum Cryptography. Berlin: Springer-Verlag, 2009: 193-241. [2] MATSUMOTO T, IMAI H. Public quadratic polynomial-tuples for efficient signature-verification and message-encryption [C]//Proceedings of Eurocrypt 1988, LNCS 330. Berlin: Springer-Verlag, 1988: 419-453. [3] FOUQUE P-A, GRANBOULAN L, STERN J. Differential cryptanalysis for multivariate schemes [C]//Advances in Cryptology - EUROCRYPT 2005: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin: Springer-Verlag, 2005: 341-353. [4] PETZOLDT A, BULYGIN S, BUCHMANN J. CyclicRainbow—A multivariate signature scheme with a partially cyclic public key [C]//Progress in Cryptology — INDOCRYPT 2010: Proceedings of the 11th International Conference on Cryptology in India, LNCS 6498. Berlin: Springer-Verlag, 2010: 33-48. [5] PETZOLDT A, BULYGIN S. Linear recurring sequences for the UOV key generation revisited [C]//ICISC 2012: Proceedings of the 15th International Conference on Information Security and Cryptology, LNCS 7839. Berlin: Springer-Verlag, 2011: 441-455. [6] PETZOLDT A, BULYGIN S, BUCHMANN J. Fast verification for improved versions of the UOV and rainbow signature schemes [C]//PQCrypto 2013: Proceedings of the 2013 5th International Workshop on Post-Quantum Cryptography, LNCS 7932. Berlin: Springer-Verlag, 2013: 188-202. [7] JIAO L, LI Y, QIAO S. A new scheme based on the MI scheme and its analysis [J]. Journal of Electronics (China), 2013, 30(2): 198-203. [8] LI H, CHEN X, PANG L, et al. Certificateless multi-receiver signcryption scheme based on multivariate public key cryptography [J]. Chinese Journal of Computers, 2013,35(9): 1881-1889. (李惠贤,陈绪宝,庞辽军,等.基于多变量公钥密码体制的无证书多接收者签密体制[J].计算机学报,2013,35(9):1881-1889) [9] DING J, SCHMIDT D. Rainbow, a new multivariable polynomial signature scheme [C]//ACNS 2005: Proceedings of the Third International Conference on Applied Cryptography and Network Security, LNCS 3531. Berlin: Springer-Verlag, 2005:164-175. [10] BAEK J, STEINFELD R, ZHENG. Formal proofs for the security of signcryption [C]//PKC 2002: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems, LNCS 2274. Berlin: Springer, 2002: 80-98. [11] FAN J, ZHENG Y, TANG X. A single key pair is adequate for the Zheng signcryption [C]//ACISP 2011: Proceedings of the 16th Australasian Conference on Information Security and Privacy, LNCS 6812. Berlin: Springer-Verlag, 2011: 371-388. [12] DENT A W, ZHENG Y. Practical signcryption [M]. Berlin: Springer-Verlag, 2010: 21-51. [13] PATARIN J. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of as-ymmetric algorithms [C]//Advances in Cryptology — EUROCRYPT'96: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, LNCS 1070. Berlin: Springer-Verlag, 1996: 33-48. [14] SAKUMOTO K, SHIRAI T, HIWATARI H. On provable security of UOV and HFE signature schemes against chosen-message attack [C]//PQCrypto 2011: Proceedings of the 4th International Workshop on Post-Quantum Cryptography, LNCS 7071. Berlin: Springer-Verlag, 2011: 68-82. |