Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions

    We introduce a new hard problem to cryptography, named Low-Rank Matrix Completion (LRMC), whose hardness is equivalence with MinRank in multivariate cryptography (NP-Complete and quantum-resistant). We present...

    Jiaming Wen, Houzhen Wang, Huanguo Zhang in Provable and Practical Security (2023)

  2. No Access

    Article

    Quantum protocols for secure multi-party summation

    Quantum secure multi-party summation is a kind of privacy-preserving summation whereby multiple mutually distrustful parties can securely compute the summation of their secret data, which can be utilized to ex...

    ZhaoXu Ji, HuanGuo Zhang, HouZhen Wang, FuSheng Wu in Quantum Information Processing (2019)

  3. No Access

    Chapter and Conference Paper

    Cryptanalysis of an ElGamal-Like Cryptosystem Based on Matrices Over Group Rings

    ElGamal cryptography is one of the most important Public Key Cryptography (PKC) since Diffie-Hellman exchanges was proposed, however these PKCs which are based on the hard problems that discrete logarithm prob...

    Jianwei Jia, Houzhen Wang, Huanguo Zhang in Trusted Computing and Information Security (2019)

  4. No Access

    Article

    Cryptanalysis of a lattice based key exchange protocol

    2014年, WANG等人提出了一个基于格的密钥交换协议。原方案研究中首先在小整数解问题(SIS)基础上他们提出了两个新的困难问题, 并基于新困难问题设计了格密钥交换协议。本文提出了一个可以在多项式时间内恢复共享密钥的高效攻击算法, 并通过理论分析和实验验证严格论证攻击算法的**确性与高效性。由于最小整数解问题在格密码设计中有很广泛的研究, 因此该方法的研究可以进行进一步推广。

    Shaowu Mao, Pei Zhang, Houzhen Wang, Huanguo Zhang in Science China Information Sciences (2016)

  5. No Access

    Article

    Cryptanalysis of an MOR cryptosystem based on a finite associative algebra

    The Shor algorithm is effective for public-key cryptosystems based on an abelian group. At CRYPTO 2001, Paeng (2001) presented a MOR cryptosystem using a non-abelian group, which can be considered as a candida...

    Wanqing Wu, Huanguo Zhang, Houzhen Wang, Shaowu Mao in Science China Information Sciences (2016)

  6. No Access

    Article

    Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem

    Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and ElGamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no...

    **hui Liu, Huanguo Zhang, Jianwei Jia, Houzhen Wang in Science China Information Sciences (2016)

  7. No Access

    Article

    A public key cryptosystem based on data complexity under quantum environment

    Since the Shor algorithm showed that a quantum algorithm can efficiently calculate discrete logarithms and factorize integers, it has been used to break the RSA, EIGamal, and ECC classical public key cryptosys...

    WanQing Wu, HuanGuo Zhang, HouZhen Wang, ShaoWu Mao in Science China Information Sciences (2015)

  8. No Access

    Article

    Polynomial-time quantum algorithms for finding the linear structures of Boolean function

    In this paper, we present quantum algorithms to solve the linear structures of Boolean functions. “Suppose Boolean function \(f\) ...

    WanQing Wu, HuanGuo Zhang, HouZhen Wang, ShaoWu Mao in Quantum Information Processing (2015)

  9. No Access

    Article

    Quantum algorithm to find invariant linear structure of MD hash functions

    In this paper, we consider a special problem. “Given a function \(f\) f ...

    WanQing Wu, HuanGuo Zhang, ShaoWu Mao, HouZhen Wang in Quantum Information Processing (2015)

  10. No Access

    Article

    Extended multivariate public key cryptosystems with secure encryption function

    Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computati...

    HouZhen Wang, HuanGuo Zhang, ZhangYi Wang, Ming Tang in Science China Information Sciences (2011)

  11. No Access

    Article

    A fast pseudorandom number generator with BLAKE hash function

    This paper presents a fast pseudorandom generation algorithm, which is based on the BLAKE hash function and can pass the random test of the NIST (National Institute of Standards and Technology) Statistical Tes...

    Houzhen Wang, Huanguo Zhang in Wuhan University Journal of Natural Sciences (2010)

  12. No Access

    Article

    Design theory and method of multivariate hash function

    This paper proposes a novel hash algorithm whose security is based on the multivariate nonlinear polynomial equations of NP-hard problem over a finite field and combines with HAIFA iterative framework. Over th...

    HouZhen Wang, HuanGuo Zhang, QianHong Wu, Yu Zhang in Science China Information Sciences (2010)

  13. No Access

    Article

    A new perturbation algorithm and enhancing security of SFLASH signature scheme

    This paper introduces the concept of noise factor and noise operation, and constructs a noise group. We present a new perturbation algorithm for enhancing security of multivariate public key cryptosystems (MPK...

    HouZhen Wang, HuanGuo Zhang, HaiMing Guan in Science China Information Sciences (2010)