{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T05:08:37Z","timestamp":1725167317199},"reference-count":7,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T00:00:00Z","timestamp":1448323200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Commun. Comput. Algebra"],"published-print":{"date-parts":[[2015,11,24]]},"abstract":"Multivariate polynomials over finite fields have found applications in Public Key Cryptography (PKC) where the hardness to find solutions provides the \"one-way function\" indispensable to such cryptosystems. Several schemes for both encryption and signature have been proposed, many of which are using quadratic (degree 2) polynomials. Finding a solution to such systems in general is called MQ problem, which easiest \"generic\" instances are NP-hard. An important feature of this Multivariate Pubic Key Cryptography (MPKC) is the resistance to quantum computers: no faster quantum algorithm than classical ones to solve MQ problem is known. Besides being thereby a candidate for Post-Quantum Cryptography, signatures are much shorter than to other candidates. We have established an open public \"MQ Challenge\" (https:\/\/www.mqchallenge.org) to stimulate progress in the design of efficient algorithms to solve MQ problem, and thus test limit parameters guaranteeing security of MPKC.<\/jats:p>","DOI":"10.1145\/2850449.2850462","type":"journal-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T19:03:44Z","timestamp":1448910224000},"page":"105-107","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A multivariate quadratic challenge toward post-quantum generation cryptography"],"prefix":"10.1145","volume":"49","author":[{"given":"Takanori","family":"Yasuda","sequence":"first","affiliation":[{"name":"Institute of Systems, Information Technologies and Nanotechnologies"}]},{"given":"Xavier","family":"Dahan","sequence":"additional","affiliation":[{"name":"Institute of Systems, Information Technologies and Nanotechnologies and Ochanomizu University"}]},{"given":"Yun-Ju","family":"Huang","sequence":"additional","affiliation":[{"name":"Institute of Systems, Information Technologies and Nanotechnologies"}]},{"given":"Tsuyoshi","family":"Takagi","sequence":"additional","affiliation":[{"name":"Institute of Systems, Information Technologies and Nanotechnologies and CREST, Japan Science and Technology Agency and Kyushu University"}]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[{"name":"Institute of Systems, Information Technologies and Nanotechnologies and Kyushu University"}]}],"member":"320","published-online":{"date-parts":[[2015,11,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1522375"},{"key":"e_1_2_1_2_1","first-page":"229","volume-title":"PQCrypto","author":"Porras J.","year":"2014","unstructured":"Porras J. , Baena J. , and Ding J. , \" ZHFE, a New Multivariate Public Key Encryption Scheme \", PQCrypto 2014 , Springer LNCS vol. 8772, pp. 229 -- 245 , 2014. Porras J., Baena J., and Ding J., \"ZHFE, a New Multivariate Public Key Encryption Scheme\", PQCrypto 2014, Springer LNCS vol. 8772, pp. 229--245, 2014."},{"key":"e_1_2_1_3_1","first-page":"76","volume-title":"Springer LNCS","author":"Ding J.","year":"2014","unstructured":"Ding J. , Petzoldt A. and Wang L-C ., \" The Cubic Simple Matrix Encryption Scheme\", PQ Crypto 2014 , Springer LNCS vol. 8772 , pp. 76 -- 87 , 2014 . Ding J., Petzoldt A. and Wang L-C., \"The Cubic Simple Matrix Encryption Scheme\", PQCrypto 2014, Springer LNCS vol. 8772, pp. 76--87, 2014."},{"key":"e_1_2_1_4_1","first-page":"206","volume":"1592","author":"Kipnis A.","year":"1999","unstructured":"Kipnis A. , Patarin J. and Goubin , L. , \" Unbalanced Oil and Vinegar Schemes\", Eurocrypt' 99 , Springer LNCS vol. 1592 , pp. 206 -- 222 , 1999 . Kipnis A., Patarin J. and Goubin, L., \"Unbalanced Oil and Vinegar Schemes\", Eurocrypt'99, Springer LNCS vol. 1592, pp. 206--222, 1999.","journal-title":"Springer LNCS"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_12"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_16"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2608628.2608669"}],"container-title":["ACM Communications in Computer Algebra"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2850449.2850462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T10:21:49Z","timestamp":1672482109000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2850449.2850462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,24]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,11,24]]}},"alternative-id":["10.1145\/2850449.2850462"],"URL":"http:\/\/dx.doi.org\/10.1145\/2850449.2850462","relation":{},"ISSN":["1932-2240"],"issn-type":[{"value":"1932-2240","type":"print"}],"subject":[],"published":{"date-parts":[[2015,11,24]]},"assertion":[{"value":"2015-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}