<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Linear Codes of Schubert Type and Quadratic Public Keys of Multivariate Cryptography</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Ustimenko</string-name>
          <email>vasyl.ustymenko@rhul.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Telecommunication and Global Information Space</institution>
          ,
          <addr-line>25 Chokolivskiy bulv., Kyiv, 03186</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Royal Holloway University of London</institution>
          ,
          <addr-line>Egham Hill, Egham TW20 0EX</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <fpage>50</fpage>
      <lpage>56</lpage>
      <abstract>
        <p>Studies of linear codes in terms of finite projective geometries form traditional direction in Coding Theory. Some applications of projective geometries are known. Noncommutative groups and semigroups defined in terms of projective geometries can serve as platforms of protocols of Post Quantum Cryptography. We introduce an idea of public keys of Multivariate Cryptography given by quadratic public rules generated via walks on incidence substructures of projective geometry with vertexes from two largest Schubert cells. It differs from the known algorithms of Code Based Cryptography and can be considered as the first attempt to combine ideas of this area with the approach of Multivariate Multivariate cryptography, code base cryptography, projective geometry, largest</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Schubert cell, symbolic computation.</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>Finite projective geometries were traditionally
used for the construction of algorithms of Coding
Theory [1]. Their applications to other areas of
Information Security have been published (see
[2], [3] devoted to Network Coding). In particular,
it was used in Cryptography (see [4], where
projective geometry were used for authentication
protocols).</p>
      <sec id="sec-2-1">
        <title>Nowadays finite geometries are</title>
        <p>widely used as tools for secret sharing.</p>
        <p>Additionally they can be used for the design of
some stream ciphers of multivariate nature and
protocols of Noncommutative Cryptography (see
[5] and further references). We introduce the first
graph
based
multivariate
public
keys
with
bijective encryption maps generated via special
walks on incidence graph of projective geometry.</p>
      </sec>
      <sec id="sec-2-2">
        <title>The tender</title>
        <p>of
Standartisation Technology (NIST, 2017) has
started the standardisation process of possible
Post-Quantum Public keys aimed for the purposes
to be (i) encryption tools, (ii) tools for digital
signatures (see [6], [7]).</p>
      </sec>
      <sec id="sec-2-3">
        <title>In July 2020 the</title>
      </sec>
      <sec id="sec-2-4">
        <title>Third</title>
      </sec>
      <sec id="sec-2-5">
        <title>Round of the</title>
        <p>competition</p>
      </sec>
      <sec id="sec-2-6">
        <title>Multivariate</title>
        <p>started.
In
the
category
of</p>
      </sec>
      <sec id="sec-2-7">
        <title>Cryptography (MC) remaining candidates are easy to observe.</title>
        <p>For the task (i) multivariate algorithm was not
selected, single multivariate candidate is ”The</p>
      </sec>
      <sec id="sec-2-8">
        <title>Rainbow</title>
      </sec>
      <sec id="sec-2-9">
        <title>Like Unbalanced</title>
      </sec>
      <sec id="sec-2-10">
        <title>Oil and Vinegar”</title>
        <p>(RUOV) digital signature method. As you see
RUOV algorithm is investigated as appropriate
instrument for the task (ii). During the Third
Round some cryptanalytic instruments to deal
with ROUV were found (see [8], [9]). That is why
different algorithms were chosen at the final stage.
In</p>
      </sec>
      <sec id="sec-2-11">
        <title>July</title>
        <p>2022
first four
winners
of</p>
        <p>
          NIST
standardisation competition were chosen. They all
are lattice based algorithms. Noteworthy that all
multivariate NIST candidates were presented by
multivariate rules of degree bounded by constant
(
          <xref ref-type="bibr" rid="ref1 ref16 ref2 ref3 ref6 ref8">2</xref>
          ) of kind
x1 → f1(x1, x2, …, xn),
x2 → f2(x1, x2, …, xn),
…,
xn → fn(x1, x2, …, xn).
        </p>
      </sec>
      <sec id="sec-2-12">
        <title>We think that NIST outcomes motivate</title>
        <p>investigations
of
alternative
options
in</p>
        <p>2023 Copyright for this paper by its authors.
Multivariate Cryptography oriented on encryption
tools for</p>
        <p>(a) The work with the space of plaintexts Fqn
and its transformation G of linear degree cn, c &gt; 0
on the level of stream ciphers or public keys.</p>
        <p>(b) The usage of protocols of Noncommutative
Cryptography with platforms of multivariate
transformations for the secure elaboration of
multivariate map G from End(Fq[x1, x2, …, xn]) of
linear or superlinear degree and density bounded
below by function of kind cnr, where c &gt; 0 and
r &gt; 1.</p>
        <p>Some ideas in directions of (a) and (b) are
presented in [10].</p>
        <p>Alternatively we hope that classical
multivariate public key approach (see [11]), i. e.
the usage of multivariate rules of degree 2 is still
able to bring reliable encryption algorithms.</p>
        <p>In this paper we suggest new quadratic
multivariate public rules defined in terms of
Projective Geometry. Recall that multivariate
public rule G has to be given in its standard form
xi → gi(x1, x2, …, xn), where polynomials gi are
given via the lists of monomial terms in the
lexicographical order.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>2. Linear Codes and Schubert</title>
    </sec>
    <sec id="sec-4">
      <title>Cellular Graphs</title>
      <p>The missing definitions of graph-theoretical
concepts which appear in this paper can be found
in [12]. All graphs we consider are simple graphs,
i. e. undirected without loops and multiple edges.
Let V(G) and E(G) denote the set of vertixes and
the set of edges of G respectively. When it is
convenient, we shall identify G with the
corresponding anti-reflexive binary relation on
V(G), i.e. E(G) is a subset of V(G) × V(G) and
write vGu for the adjacent vertexes u and v (or
neighbours). We refer to |{x ∈ V (G)|xGv}| as
degree of the vertex v.</p>
      <p>The incidence structure is the set V with
partition sets P (points) and L (lines) and
symmetric binary relation I such that the
incidence of two elements implies that one of
them is a point and another one is a line. We shall
identify I with the simple graph of this incidence
relation or bipartite graph. The pair x, y, x ∈ P, y
∈ L such that xIy is called a flag of incidence
structure I.</p>
      <p>Projective geometry n−1PG(Fq) of dimension
n – 1 over the finite field Fq, where q is a prime
power, is a totality of proper subspaces of the
vector space V = Fqn of nonzero dimension. This
is the incidence system with type function t(W) =
dim(W), W ∈ n−1PG(Fq) and incidence relation I
defined by the condition W1IW2 if and only if one
of these subspaces is embedded in another one.</p>
      <p>We can select standard base e1, e2, …, en of V
and identify nPG(Fq) with the totality of linear
codes in Fqn. The geometry nΓ(q) =n−1 PG(Fq) is a
partition of subsets nΓi(q) consisting of elements
of selected type i, i = 1, 2, …,n – 1.</p>
      <p>We assume that each element of V is presented
in the chosen base as column vector (x1, x2, …, xn).
Let U stands for the unipotent subgroup of
automorphism group PGLn(Fq) consisting of
lower unitriangular matrices. Let us consider
orbits of the natural action of U on the projective
geometry nPG(Fq). They are known as large
Schubert cells. Each of orbits on the set Γm(Fq)
contains exactly one symplectic element spanned
by elements ei1, ei2, …, eim. So the number of
orbits of (U, Γm(Fq)) equals to binomial
coefficient C(n, m). Noteworthy that the
cardinality of nΓm(Fq) is expressed by Gaussian
binomial coefficient. Unipotent subgroup U is
generated by elementary transvections xi,j(t), i &lt; j,
t ∈ Fq. If we select i and j then elements of kind
xi,j(t) form root subgroup Ui,j corresponding to the
positive root ei − ej of root system An.</p>
      <p>Let J be a proper subset of {1, 2, …, n} = N, JS
be Schubert cell containing symplectic subspace
WJ spanned by ej ∈ J, ∆(J) = {(i, j)|i ∈ J, j ∈ N −
J, i &lt; j}. Then a subgroup U(J) generated by root
subgroups Ui,j, (i, j) ∈ ∆(J) of order qk, k = |∆(J)|
acts regularly on JS. It means that we can identify
JS and U(J). Noteworthy that each Γm(Fq) has a
unique largest Schubert cell of size qm(n – m), it is
JS for J = {n, n – 1, n – 2, …, n – m + 1}. We
denote this cell as mLS(q).</p>
      <p>We consider the bipartite graph m,kIn(Fq) of the
restriction of I onto disjoint union mLS(Fq) and
kLS(Fq). It is bipartite graph with bidegrees qr and
qs where
r = |∆({n, n – 1, n – 2, …, n – m + 1})
– ∆({n, n – 1, n – 2, …, n – m + 1})
 ∆({n, n – 1, n – 2, …, n – k + 1})|
and
s = |∆({n, n – 1, n – 2, …, n – k + 1})
– ∆({n, n – 1, n – 2, …, n – m + 1})
 ∆({n, n – 1, n – 2, …, n – k + 1})|.</p>
      <p>We refer to m,kIn(q) as Cellular Schubert graph
and denote it as CSnm,k(Fq) graph. In particular
case n = 2m + 1, k = m these graphs are known as
Double Schubert graphs [13].</p>
    </sec>
    <sec id="sec-5">
      <title>3. Schubert Cellular Graphs over</title>
    </sec>
    <sec id="sec-6">
      <title>Commutative Ring</title>
      <p>Let K be a commutative ring. We consider
group U = Un(K) of lower unitriangular n × n
matrices with entries from K. Let ∆ be the totality
of all entries of (i, j), 1 ≤ i &lt; j ≤ n, i. e. totality of
positive roots from An. We identify element M
from Un(K) with the function f : ∆ → K such that
f (i, j) = mi,j. The restriction M|D of M on subset D
of ∆ is simply f|D.</p>
      <p>For each proper nonempty subset J of {1, 2,
…, n} we define U (J) as totality of matrices M =
(mi,j) from U such that (i, j) ∈ ∆ – ∆(J) implies that
mi,j = 0.</p>
      <p>We define incidence system n−1PG(K) as
totality of pairs (J, M), M ∈ U(J) with type
function t(J, M) = |J and incidence relation given
by conditions (1J,1M)I(2J,2M) if and only if one of
subsets 1J and 2J is embedded in another one and
(1M − 2M)|∆(1J)∩∆(2J) = 1M × 2M − 2M × 1M.</p>
      <p>We refer to this incidence system as projective
geometry scheme over commutative ring K. If K =
F is the field then n−1PG(F) coincides with n –
1dimensional projective geometry over F, i. e.
totality of proper nonzero subspaces of the vector
space Fn (see [14]).</p>
      <p>The reader can find similar interpretations of
Lie geometries and their Schubert cells in [15],
[16], their generalisations via pairs of type
(irreducible root system, commutative ring K) are
presented in [17] and [5]. The concept of large and
small Schubert cell in the classical case of field is
presented in [18], [19].</p>
      <p>We introduce Γm(K), mLS(K) and graphs
CSm,k(Fq) for m = 1, 2, …, n − 1 via simple
substitution of K instead Fq. We refer to disjoint
union of mLS(K), m = 1, 2, …, n − 1 with the
restriction of incidence relation I and type
function t on this set as Schubert geometry scheme
of type An over commutative ring K. We refer to
elements of this incidence system as linear codes
of Schubert type. We can define Schubert
schemes over other Dynkin-Coxeter diagrams.</p>
    </sec>
    <sec id="sec-7">
      <title>4. Linguistic Graphs of Type (r, s, p) and Symbolic Computations</title>
      <p>Let K be a commutative ring. We refer to an
incidence structure with a point set P = Ps,m = Ks+m
and a line set L = Lr,m = Kr+m as linguistic incidence
structure Im(K) of type (r, s, m) if point x = (x1, x2,
…, xs, xs+1, xs+2, …, xs+m) is incident to line y = [y1,
y2, …, yr, yr+1, yr+2, …, yr+m] if and only if the
following relations hold
a1xs+1 + b1yr+1 = f1(x1, x2, …, xs, y1, y2, …, yr)
a1xs+2 + b2yr+2 = f2(x1, x2, …, xs, xs+1, y1, y2, …,
yn, yr+1)
…
amxs+m+bmyr+m = fm(x1, x2, …, xs, xs+1, …, xs+m,
y1, y2, …, yr, yr+1, …, yr+m)
where aj and bj, j = 1, 2, …, m are not zero divisors,
and fj are multivariate polynomials with
coefficients from K. Brackets and parenthesis
allow us to distinguish points from lines (see [20],
[5]).</p>
      <p>The colour ρ(x) = ρ((x)) (ρ(y) = ρ([y])) of point
(x) (line [y]) is defined as projection of an element
(x) (respectively [y]) from a free module on its
initial s (relatively r) coordinates. As it follows
from the definition of linguistic incidence
structure for each vertex of incidence graph there
exists the unique neighbour of a chosen colour.</p>
      <p>We refer to ρ((x)) = (x1, x2, …, xs) for (x) = (x1,
x2, …, xs+m) and ρ([y]) = (y1, y2, …, yr) for [y] = [y1,
y2, …, yr+m] as the colour of the point and the
colour of the line respectively.</p>
      <p>For each b ∈ Kr and p = (p1, p2, …, ps+m) there
is the unique neighbour of the point [l] = Nb(p)
with the colour b. Similarly, for each c ∈ Ks and
line l = [l1, l2, …, lr+m] there is the unique neighbour
of the line (p) = Nc([l]) with the colour c. We refer
to operator of taking the neighbour of vertex
accordingly chosen colour as neighbourhood
operator.</p>
      <p>On the sets P and L of points and lines of
linguistic graph we define jump operators 1J =
1Jb(p) = (b1, b2, …, bs, p1, p2, …, ps+m), where (b1,
b2, …, bs) ∈ Ks and 2J = 2Jb([l]) = [b1, b2, …, br, l1,
l2, …, lr+m], where (b1, b2, …, br) ∈ Kr. We refer to
tuple (s, r, m) as type of the linguistic graph I.</p>
      <p>We say that linguistic graph has degree d, d ≥ 2
if maximal degree of nonlinear multivariate
polynomials fi, i = 1, 2, …, m is d. Noteworthy,
that the path v0, v1, …, vk in the linguistic graph Im
is determined by starting vertex v0 and colours of
vertexes v1, v2, …, vk such that ρ(vi) /= ρ(vi+2) for i
= 0, 1, …, k − 2. We can consider graph Im(K)
together with I˜m = Im(K[y1, y2, …, yl]) defined by
the same polynomials fi, i = 1, 2, …, m with
coefficients from K.</p>
      <p>Assume that l = m + s. We can consider the
path of length 2k with starting point (y1, y2, …, ys,
ys+1, ys+2, …, ym) and colours G1 = (1g1(y1, y2, …,
ys), 1g2(y1, y2, …, ys), …, 1gr(y1, y2, …, ys)), H1=
(1h1(y1, y2, …, ys), 1h2(y1, y2,..., ys), …, 1hs(y1, y2, …,
ys)), G2 = (2g1(y1, y2, …, ys), 1g2(y1, y2, …, ys), …,</p>
      <p>We define degree of tuple (g1, g2, …, gd) ∈
K[x1, x2, …, xl]d as maximal degree of polynomials
gi, i = 1, 2, …, d. The following two statements are
proven in [5].</p>
      <p>Theorem 1. Let K be a commutative ring.
Cellular Schubert graph CSnm,k(K) is a linguistic
graph of degree 2 of type (r, s, p) where r = |∆({n,
n − 1, n − 2, …, n − m + 1}) − ∆({n, n − 1, n − 2,
…, n − m + 1}) ∩ ∆({n, n − 1, n − 2, …, n − k +
1})|, s = |∆({n, n − 1, n − 2, …, n − k + 1}) − ∆({n,
n − 1, n − 2, …, n − m + 1}) ∩ ∆({n, n − 1, n − 2,
…, n − k + 1})| and p = |∆({n, n − 1, n − 2, …, n −
m + 1}) ∩ ∆({n, n − 1, n − 2, …, n − k + 1})|.</p>
      <p>Theorem 2. Let CSnm,k(K) be a Cellular
Schubert as in the previous statement. Then
transformations Pas(G1, G2, …, Gj, H1.H2, …, Hj),
j ≥ 1 of the affine space Ks+p such that deg(Hi) = 1,
deg(Gi) = 1, i = 1, 2, …, j are quadratic
multivariate maps of this space into itself.
on</p>
    </sec>
    <sec id="sec-8">
      <title>Cellular 5.1.</title>
    </sec>
    <sec id="sec-9">
      <title>Construction of the Map</title>
      <p>As usually we have to describe procedures for
the owner of the key (Alice) and public user Bob.
We start from the generating procedure for the
multivariate map.</p>
      <p>
        Alice selects parameter n, constants α and β
from open interval (
        <xref ref-type="bibr" rid="ref15 ref4 ref7">0, 1</xref>
        ) together with constants
a and b from Z.
      </p>
      <p>She sets parameters m = [αn + a] and k = [βn +
b], where parenthesis denote the flow function.
Alice takes finite field F = F2t, t ≥ 32.</p>
      <p>
        Alice computes parameter s, r and p of the
linguistic graph CSnm,k(K). She selects the length
of path j. Alice will use vector space Fs+p as space
of plaintexts. Thus she selects square matrices A1,
A2, …, Aj of dimensions s × s and matrices B1, B2,
…, Bj of dimensions r × s. Alice takes rows of
Ai(y1, y2, …, ys)T as linear forms ihl(y1, y2, …, yn)
for i = 1, 2, …, j, l = 1, 2, …, s and Bi(y1, y2, …, ys)T
to get linear forms igl(y1, y2, …, ys), i = 1.2, …, j, l
= 1, 2, …, r. Thus she constructed Hi and Gi for
the computation of the path in the graph CSnm,k(F
[y1, y2, …, ys, ys+1, …, ys+p]) and transformation
Pas(G1, G2, …, Gj, H1, H2, …, Hj) of kind (
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ).
      </p>
      <p>After creation of the point (p) = (jh1, jh2, …, jhs,
fs+1, fs+2, …, fs+m) of the graph CSnm,k(F [y1, y2, …,
ys, ys+1, …, ys+p]). Alice uses jump operator to get
1Jb(p) with b formed in the following way.</p>
      <p>
        She divide variables into two groups y1, y2, …,
ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ) and ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+1, ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+2, …, ys where positive integer
s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ) is a linear expression of kind [γ × s] + σ] with
0 ≤ γ &lt; 1 and positive integer constant σ.
      </p>
      <p>
        Alice takes map D of kind y1 → y12, y2 → y22,
…, ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ) → ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )2. She takes element T from
AGLs(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )(Fq) and forms a conjugation Q = T−1DT of
degree 2. Let Qi = Q(yi) for i = 1, 2, …, s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ). She
forms the map E given by the following rule
y1 → Q1(y1, y2, …, ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )),
y2 → Q2(y1, y2, …, ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )),
…,
ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ) → Qs(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )(y1, y2, …, ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )),
ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+1 → as(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+1,1y1 + as(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+1,2y2 + ··· + as(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+1,s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )
ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+b1,1ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+1,b1,2ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+2 + ··· + b1,s−s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )ys,
      </p>
      <p>
        ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+2 → as(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+2,1y1 + as(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+2,2y2 + ··· + as(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+2,s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )
ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ) + b2,1ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+1 b2,2ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+2 + ··· + b2,s−s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )ys,
...
      </p>
      <p>
        ys → as,1y1 + as,2y2 + ··· + as,s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ) + bs−s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ),1
ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+1, bs−s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ),2ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )+2 + ··· + bs−s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ),s−s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )ys,
ys+1 → fs+1(y1, y2, …, ys+p),
ys+2 → fs+2(y1, y2, …, ys+p),
…,
ys+p → fs+p(y1, y2, …, ys+p).
where ai,j are chosen as some linear forms in
variables y1, y2, …, ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ) and matrix B = (bi,j) from
GLs−s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )(Fq) is selected as Singer cycle, i.e.
element of GLs−s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        )(Fq) of order qs−s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ) − 1.
      </p>
      <p>
        Noteworthy that the restriction Q of E on
variables y1, y2, …, ys(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ) has order m in the case of
q = 2m and the degree of Q−1 is 2m−1. We assume
that parameter m is even.
      </p>
      <p>
        The order of cyclic group generated by E′
which is the restriction of E on variables y1, y2, …,
ys is multiple of m × 2s−s(
        <xref ref-type="bibr" rid="ref15 ref4 ref7">1</xref>
        ). Alice can use
transformation of kind C−1E′C, C ∈ GLs(Fq)
instead of E′.
      </p>
      <p>Alice selects two elements 1T and 2T of affine
group AGLs+p(F ). and computes the superposition
E˜ = 1TE2T in its standard form
y1 → f˜1(y1, y2, …, ys+p),
y2 → f˜1(y1, y2, …, ys+p),
…
ys+p → f˜1(y1, y2, …, ys+p).</p>
      <p>She presents multivariate rule E˜ to public
users.</p>
      <p>The inverse of E˜ has polynomial degree
≥ 2m−1. Noteworthy that the choice 2T = 1T−1
insures that cyclic group generated by E˜ has order
multiple to m × (2m − 1).</p>
      <p>Thus public user (Bob) works with the space
of plaintexts Fqd, d = p + s. He is able to encrypt
his plaintext in time O(d3).</p>
    </sec>
    <sec id="sec-10">
      <title>5.2. Description of Decryption</title>
    </sec>
    <sec id="sec-11">
      <title>Procedure</title>
      <p>Let us consider the private key procedure for
the decryption. Assume that Alice gets the
ciphertext c = (c1, c2, …, cs+p).</p>
      <p>Step 1. She treats it as column vector and
computes T2−1(c) = (q1, q2, …, qs, qs+1, …, qs+p).</p>
      <p>Step 2. Alice uses affine transformation T and
matrix B to solve the following equations.</p>
      <p>E′(z1, z2, …, zs) = c1,
E′(z1, z2, …, zs) = c2,
…
E′(z1, z2, …, zs) = cs.</p>
      <p>Assume that zi = di, i = 1, 2, …, s is the solution.</p>
      <p>Step 3. She computes numerical colours Gt(d1,
d2, …, ds) = (ta1, ta2, t ar) = ta and Ht(d1, d2, …, ds)
= tb for t = 1, 2, …, j.</p>
      <p>Step 4. Alice forms the point 1p of the graph
CSnm,k(F) in the form (jb1, jb2, …, jbs, qs+1, qs+2, …,
qs+p).</p>
      <p>Step 5. She computed the path in this graph
with the starting point 1p and consecutive colours
ja, j−1b, j−1a, j−2b, j−2a, …, 1b, 1a, 0b = (d1, d2, …, ds).
Let 2p be the final vertex of the computed path
with the colour 0b.</p>
      <p>Step 6. Alice treats 2p as column vector and
computes the plaintexts as T1−1(2p).</p>
    </sec>
    <sec id="sec-12">
      <title>6. Illustrative Example, Complexity</title>
    </sec>
    <sec id="sec-13">
      <title>Estimates, and Implemented Cases</title>
      <p>We can define mentioned above Double
Schubert Graph DS(k, K) over commutative ring
K simply as incidence structure defined as disjoint
union of partition sets PS = Kk(k+1) consisting of
points which are tuples of kind x = (x1, x2, …, xk,
x1,1, x1,2, …, xk,k) and LS = Kk(k+1) consisting of lines
which are tuples of kind z = [z1, z2, …, zk, z11, z12,
…, zk,k], where x is incident to z, if and only if xi,j
− zi,j = xizj for i = 1, 2, …, k and j = 1, 2, …, k. It is
convenient to assume that the indexes of kind i, j
are placed for tuples of Kk(k+1) in the
lexicographical order.</p>
      <p>Remark. The term Double Schubert Graph is
chosen, because points and lines of DS(k, Fq) can
be treated as subspaces of Fq2k+1 of dimensions k
+ 1 and k, which form two largest Schubert cells.
Recall that the largest Schubert cell is the largest
orbit of group of unitriangular matrices acting on
the variety of subsets of given dimension.</p>
      <p>We define the colour of point x = (x1, x2, …, xk,
x1,1, x1,2, …, xk,k) from PS as tuple (x1, x2, …, xk)
and the colour of a line y = [z1, z2, …, zk, z1,1, z1,2,
…, zk,k] as the tuple (z1, z2, …, zk). For each vertex
v of DS(k, K), there is the unique neighbour y =
Na(v) of a given colour a = (a1, a2, …, ak).</p>
      <p>Let us consider the list of variables
corresponding to coordinates of the point. So we
get y1, y2, …, yk , y1,1, y1,2, …, yk,k. We will use the
ring R = K[y1, y2, …, yk, y1,1, y1,2, …, yk,k].</p>
      <p>Let D˜S(k, K) = DS(k, R). To define Pas =
Pas(G1, G2, …, Gj, H1, H2, …, Hj) and construct
the path with starting point (y1, y2, …, yk, y11, y12,
…, yk,k) and the symbolic colours Gi(y1, y2, …, yk)
= ib1y1 + ib2y2 + ··· + ibkyk, Hi(y1, y2, …, yk) = ia1y1
+ ia2y2 + ··· + iakyk, ai ∈ K, bi ∈ K are used.</p>
      <p>The complexity of computation of T1PasT2 is
determined by the time of computation of the path
u, 1u, 2u, …, 2ju in the graph DS(k, R) with the
starting point u = (T1(y1), T1(y2), …, T1(yk), T1(y1,1),
T1(y1,2), …, T1(yk,k)) and colours</p>
      <p>G1(u1, u2, …, uk, u1,1, u1,2, …, uk,k), H1(u1, u2, …,
uk, u1,1, u1,2, …, uk,k),</p>
      <p>G2(u1, u2, …, uk, u1,1, u1,2, …, uk,k), H2(u1, u2, …,
uk, u1,1, u1,2, …, uk,k), …,</p>
      <p>Gj(u1, u2, …, uk, u1,1, u1,2, …, uk,k), Hj(u1, u2, …,
uk, u1,1, u1,2, …, uk,k).</p>
      <p>The key parameter here is j. Let us assume that
j = O(k). The computation of selected coordinate
of final point of the walk requires computation of
GiHi depending k + k2 for each parameter i and
adding obtained quadratic polynomials. Thus it
takes 2k4j operations of addition and
multiplication in K and the complexity is O(k5).
We have to execute this procedure k2 + k times. So
the complexity of public rule development is
O(k7) or O(d3+1/2), where d = k2 + k is the
dimension of the space of plaintexts.</p>
      <p>Public user encrypts in time O(d3).</p>
      <p>Let us estimate the complexity of private
encryption procedure of Alice. She applies the
inverse of T2 to the obtained ciphertext c and gets
1c = T2−1(c). It requires O(d2) elementary
operations in the field K. Alice has to solve the
system of k equations to find the reimage of 1c of
the map E′ with the usage of known matrices T and
B of size ≤ k × k. Getting the solution z = (d1, d2,
…, dk) of the system of equations requires less
than O(d2) operations. It allows her to compute
colours gi = Gi(d1, d2, …, dk), hi = Hi(d1, d2, …, dk),
i = 1, 2, …, j.</p>
      <p>Alice changes the first coordinate of T2−1(c) for
hj and gets the point 2ju. She computes the chain
with the starting point 2ju and further consecutive
members with colours gj, hj−1, gj−1, hj2 , …, g1, h1,
z. Alice gets the final point u of the chain with the
colur z in time less than O(d2). Finally she need
O(d2) operation to compute the ciphertext as T1−1.
So the complexity of entire private encryption
procedure is O(d2).</p>
      <p>As we mentioned above graph CS2k+1k,k (K) is
isomorphic to Double Schubert graph DS(k, K). It
is easy to check that theoretical complexity of
described above public key algorithm based on
graph CS2k+α+β+1k+α,k+β, where α and β are
nonnegative constants, is the same with the case
of the DS(k, K). The dimension of the space of
plaintext is d = (k + α + β) × (α + 1). Cost of
generation of public rule is O(d3+1/2), complexity
of private key decryption is O(d2), public
encryption costs O(d3).</p>
      <p>We select this class of algorithms and K = F2³²
for the implementation.</p>
    </sec>
    <sec id="sec-14">
      <title>7. Conclusions</title>
      <p>Modern public key cryptography is based on
the complexity of hard unsolved problems.
Especially important is the fundamental
assumption of cryptography that there are no
polynomial-time algorithms for solving any
NPhard problem. A consequence of this assumption
is that there are cryptographically interesting
problems that are hard to solve in the quantum
setting. Each of five core directions of Post
Quantum Cryptography is based on the
complexity of some NP-hard problem. The paper
is connected with the following two directions.</p>
      <p>Code-based cryptography: cryptographic
primitives based on the hardness of decoding
random linear codes are historically the first
postquantum systems. Since the late 1970s schemes
like McEliece encryption have withstood a long
series of cryptanalytic attacks. In order to embed
a trapdoor that enables decryption one converts a
structured code with good decryption capabilities
like a Goppa code by linear transformations into a
“random-looking” code C. An attacker now faces
the problem to either distinguish C from a purely
random code using the properties of the
underlying structured code or to directly decode
C. The last approach leads to the best known
generic attacks. Recent significant progress on
decoding binary linear codes C of dimension n
leads to a new trend in code-based cryptography
based on the usage of linear codes that are
different than Goppa code initially proposed by
McEliece (MDPC codes, Rank codes,
quasicyclic codes, and others). New approach promises
to decrease the size of the public key.</p>
      <p>Multivariate cryptography is usually defined
as the set of cryptographic schemes using the
computational hardness of the Polynomial System
Solving problem over a finite field. Solving
systems of multivariate polynomial equations is
proven to be NP-hard or NP-complete. That is
why these schemes are often considered to be
good candidates for post-quantum cryptography.
The first multivariate scheme based on
multivariate equations was introduced by
Matsumoto and Imai in 1988. Later J. Patarin
found nice and efficient cryptanalytic solution to
break this scheme (see [11]). Two following
schemes suggest the most robust solutions. They
are HFE (Hidden Field Equations) and UOV
(Unbalanced Oil and Vinegar), both developed by
J. Patarin in the late 1990s. Special variants of
theses schemes have been submitted to the
postquantum standardization process organized by
NIST. During this process new cryptanalytic
methods to break these cryptosystems were found
(see [7]). It motivates development of new public
keys of Multivariate Cryptography.</p>
      <p>We suggest the usage of the bridge between
Coding Theory and Multivariate Cryptography
based on the pairs of kind (PGn(Fq), PGn(Fq[x1, x2,
…, xm]) where PGn(Fq) is classical finite
ndimensional projective geometry and PGn(Fq[x1,
x2, …, xm]) is its natural analog defined over
multivariate ring Fq[x1, x2, …, xm]. For the
construction of public key a hidden problem to
find a path between two vertexes of the incidence
graph of PGn(Fq[x1, x2, …, xm]) is used. We take
these vertexes in general position, i.e. they are of
different type and belong to distinct largest
Schubert cells. In the case of finite field F2t the
multivariate rule is given by the system of
quadratic equations. The choice of large t (like 32,
64) insures that the inverse map has a very large
polynomial degree.</p>
      <p>The bijective public rule can be used as
instrument of encryption as well as for making
digital signatures. In case of digital signatures the
usage of nonbijective modifications of E˜ as
above is also possible.</p>
    </sec>
    <sec id="sec-15">
      <title>8. Funding</title>
      <p>This research is supported by British Academy
Fellowship for Researchers at Risk 2022.</p>
    </sec>
    <sec id="sec-16">
      <title>9. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <volume>2gr</volume>
          (
          <issue>y1</issue>
          ,
          <year>y2</year>
          , …, ys)), …, Gk =
          <article-title>(kg1(y1</article-title>
          ,
          <year>y2</year>
          , …, ys),
          <source>kg2(y1,</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          y2, …, ys), …,
          <source>kgr(y1</source>
          ,
          <year>y2</year>
          , …, ys)),
          <article-title>Hk = (kh1(y1, y2, …,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>ys)</source>
          ,
          <source>kh2(y1</source>
          ,
          <year>y2</year>
          , …, ys), …,
          <source>khs(y1</source>
          ,
          <year>y2</year>
          , …, ys)).
          <article-title>The last vertex of this path will be a point (p)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>= (kh1(y1</article-title>
          ,
          <year>y2</year>
          , …, ys),
          <source>kh2(y1</source>
          ,
          <year>y2</year>
          , …, ys), …,
          <source>khs(y1</source>
          ,
          <year>y2</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          …, ys),
          <source>fm+1</source>
          (
          <issue>y1</issue>
          ,
          <year>y2</year>
          , …, ys,
          <source>ys+1</source>
          , ys+2, …, ys+m),
          <source>fm+2</source>
          (
          <issue>y1</issue>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          y2, …, ys,
          <source>ys+1</source>
          , ys+2, …, ys+m), …, fm+s(
          <issue>y1</issue>
          ,
          <year>y2</year>
          , …, ys,
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>ys+1</source>
          , ys+2, …, ys+m)).
          <article-title>We define the passage transformation Pas(G1,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>G2</surname>
          </string-name>
          , …, Gk, H1,
          <fpage>H2</fpage>
          , …, Hk)
          <article-title>of Kr+s (space of points)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>with symbolic colours G1, H1</article-title>
          , …, Gk, Hk via
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <article-title>multivariate rule y1 → kh1(y1</article-title>
          ,
          <year>y2</year>
          , …, ys),
          <source>y2 → kh2(y1</source>
          ,
          <year>y2</year>
          , …, ys),
          <article-title>… ys → khs(y1</article-title>
          ,
          <year>y2</year>
          , …, ys),
          <source>ym+1 → fs+</source>
          <volume>1</volume>
          (
          <issue>y1</issue>
          ,
          <year>y2</year>
          , …,
          <source>ym+s)</source>
          ,
          <article-title>(1) … ym+2 → fs+2(y1, y2, …, ym+s), … ym+s → fs+m(y1, y2, …, ym+s). It is easy to see that this transformation is</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <article-title>bijective if the map yi → hi(y1</article-title>
          ,
          <year>y2</year>
          , …, ys),
          <source>i = 1</source>
          ,
          <issue>2</issue>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <article-title>semigroup are discussed in [5]. Of course we can use lines instead of points</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <article-title>transformation of kind Pas(H1, H2</article-title>
          , …, Hk, G1,
          <fpage>G2</fpage>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <article-title>elements of K[y1, y2, …, yr]s and Gi ∈ K[y1</article-title>
          ,
          <year>y2</year>
          , …,
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>W. C.</given-names>
            <surname>Huffman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pless</surname>
          </string-name>
          , Fundamentals of Error-Correcting
          <string-name>
            <surname>Codes</surname>
          </string-name>
          , Cambridge Univ. Press,
          <year>2003</year>
          . doi:
          <volume>10</volume>
          .1017/cbo9780511807077
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Betten</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Error-Correcting Linear</surname>
          </string-name>
          Codes, in Algorithms and Computation in Mathematics,
          <year>2006</year>
          . doi:
          <volume>10</volume>
          .1007/3-540-31703-1
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Essenhans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kohnert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wassermann</surname>
          </string-name>
          ,
          <article-title>Constructions of Codes for Network Coding</article-title>
          , arXiv:
          <volume>1005</volume>
          , 2839[cs]
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Beutelspacher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Enciphered</given-names>
            <surname>Geometry</surname>
          </string-name>
          . Some Applications of Geometry to Cryptography,
          <source>Annals of Discrete Mathematics 37</source>
          ,
          <year>1988</year>
          ,
          <fpage>59</fpage>
          -
          <lpage>68</lpage>
          . doi:
          <volume>10</volume>
          .1016/s0167-
          <volume>5060</volume>
          (
          <issue>08</issue>
          )
          <fpage>70225</fpage>
          -
          <lpage>5</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          , Graphs in Terms of Algebraic Geometry,
          <source>Symbolic Computations and Secure Communications in Post-Quantum World, UMCS Editorial House, Lublin</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>National</given-names>
            <surname>Institute</surname>
          </string-name>
          of Standards and Technology,
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          ,
          <year>2023</year>
          . https://csrc.nist.gov/projects/postquantum-cryptography
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Advances</surname>
            <given-names>in Cryptology</given-names>
          </string-name>
          , EUROCRYPT, in A. Canteaut,
          <string-name>
            <given-names>F.-X.</given-names>
            <surname>Standaert</surname>
          </string-name>
          (Eds.),
          <source>Lecture Notes in Computer Science</source>
          , Springer,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77870-5
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ding</surname>
          </string-name>
          , et al.,
          <source>The Nested Subset Differential Attack, Advances in Cryptology, EUROCRYPT</source>
          ,
          <year>2021</year>
          ,
          <fpage>329</fpage>
          -
          <lpage>347</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77870-5_
          <fpage>12</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>W.</given-names>
            <surname>Beullens</surname>
          </string-name>
          ,
          <article-title>Improved Cryptanalysis of UOV and Rainbow</article-title>
          , Advances in Cryptology, EUROCRYPT,
          <year>2021</year>
          ,
          <fpage>348</fpage>
          -
          <lpage>373</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77870-5_
          <fpage>13</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On Extremal Algebraic Graphs and Multivariate Cryptosystems, IACR e-print archive</article-title>
          ,
          <year>2022</year>
          /1537.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>Goubin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Patarin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.-Y.</given-names>
            <surname>Yang</surname>
          </string-name>
          , Multivariate Cryptography,
          <source>Encyclopedia of Cryptography and Security</source>
          ,
          <year>2011</year>
          ,
          <fpage>824</fpage>
          -
          <lpage>828</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-1-
          <fpage>4419</fpage>
          -5906-5_
          <fpage>421</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Brouwer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Niemaier</surname>
          </string-name>
          , Distance Regular Graph, Springer, Berlin,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On Computations with Double Schubert Automaton and Stable Maps of Multivariate Cryptography</article-title>
          ,
          <source>Annals of Computer Science and Information Systems</source>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .15439/2021f67
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On Some Properties of Chevalley Groups and Their Generalisations</article-title>
          ,
          <source>in Investigations in Algebraic Theory of Combinatorial Objects</source>
          ,
          <year>1992</year>
          ,
          <fpage>112</fpage>
          -
          <lpage>119</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          , Linear Interpretation of Chevalley Group Flag Geometries, Ukraine Math. J.,
          <volume>43</volume>
          , nos.
          <volume>7</volume>
          ,
          <issue>8</issue>
          ,
          <year>1991</year>
          ,
          <volume>10551061</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>Small Schubert Cells as Subsets in Lie Algebras</article-title>
          ,
          <source>Functional Analysis and Applications</source>
          ,
          <volume>25</volume>
          (
          <issue>4</issue>
          ),
          <year>1991</year>
          ,
          <volume>8183</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <source>On Small World Non Sunada Twins and Cellular Voronoi Diagams, in 6th conference, Algebra and Discrete Mathematics</source>
          , vol.
          <volume>30</volume>
          (
          <issue>1</issue>
          ),
          <year>2020</year>
          ,
          <fpage>118</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [18]
          <string-name>
            <surname>I. Gelfand</surname>
          </string-name>
          , R. MacPherson,
          <article-title>Geometry in Grassmanians and Generalisation of the Dilogarithm, Adv</article-title>
          . in Math.,
          <volume>44</volume>
          ,
          <year>1982</year>
          ,
          <fpage>279</fpage>
          -
          <lpage>312</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>I.</given-names>
            <surname>Gelfand</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Serganova</surname>
          </string-name>
          ,
          <source>Combinatorial Geometries and Torus Strata on Homogeneous Compact Manifolds</source>
          , Soviet Math. Surv.,
          <volume>42</volume>
          ,
          <year>1987</year>
          ,
          <fpage>133</fpage>
          -
          <lpage>168</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          , Maximality of Affine Group and Hidden Graph Cryptsystems,
          <source>J. of Algebra and Discrete Math., 10</source>
          ,
          <year>2004</year>
          ,
          <fpage>51</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>