<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On Schubert cells of projective geometry and pseudo- quadratic public keys of multivariate cryptography ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Ustimenko</string-name>
          <email>vasyl.ustymenko@rhul.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Pustovit</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CPITS-II 2024: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Telecommunications and Global Information Space</institution>
          ,
          <addr-line>13 Chokolivsky ave., 02000 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Royal Holloway University of London</institution>
          ,
          <addr-line>TW20 0EX Egham</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
      </contrib-group>
      <fpage>198</fpage>
      <lpage>205</lpage>
      <abstract>
        <p>Jordan-Gauss graphs are bipartite graphs given by special quadratic equations over the commutative ring K with unity with partition sets K n and K m, n≥m such that the neighbour of each vertex is defined by the system of the linear equation given in its row-echelon form. Assume that K is a finite multivariate commutative ring and the cardinality of multiplicative group K* is &gt;2. We use families of these graphs for the construction of new injective multivariate maps F of (K*) n onto Kn of unbounded degree of size O(n) with the trapdoor accelerators T, i.e. pieces of information which allows us to compute the reimage of the given value of F in polynomial time. The number of monomial terms of multivariate rule F written in its standard form (the density) is O(n2). Thus public user can encrypt his/her message in time O(n3) similar to the case of a quadratic map. This cryptosystem can be obfuscated via the use of a temporal analogue of selected Jordan-Gauss graphs. Previously known multivariate cryptosystems of unbounded degree have density O(n4) of F allowing us to use the inform in the case of finite field it can be used for the construction of new cryptosystems from known pairs (F, T).</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;multivariate cryptography</kwd>
        <kwd>Jordan-Gauss graphs</kwd>
        <kwd>projective geometries</kwd>
        <kwd>temporal graphs</kwd>
        <kwd>largest Schubert cells</kwd>
        <kwd>symbolic computations 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>This paper presents the modification of the quadratic
multivariate public key given in [1] and defined via special
walks on projective geometries over finite fields and their
natural analogs defined over general commutative rings.
New graph-based multivariate rules are “pseudo quadratic”,
i.e., they are maps of unbounded degree of size O(n) but the
number of monomial terms in all equations is O(n2). So, like
in the case of a quadratic map the computation of the value
of the map on the given tuple costs O(n3).</p>
      <p>Multivariate cryptography is one of the five main
directions of Post-Quantum Cryptography.</p>
      <p>The progress in the design of experimental quantum
computers is speeding up lately. Expecting such development
the National Institute of Standardisation Technologies of USA
announced in 2017 the tender on the standardisation best
known quantum-resistant algorithms of asymmetrical
cryptography. The first round was finished in March 2019, and
essential parts of the presented algorithms were rejected. At the
same time, the development of new algorithms with a
postquantum perspective was continued. A similar process
took place during the 2, 3, and 4th rounds.</p>
      <p>The last algebraic public key “Unbalanced Oil and Vinegar
on Rainbow like digital signatures” (ROUV) constructed in
terms of multivariate cryptography was rejected in 2021 (see [2,
3]). The first 4 winners of this competition were announced in
1922, they were developed in terms of Lattice Theory.</p>
      <p>Noteworthy that the NIST tender was designed for the
selection and investigation of public key algorithms and in
the area of multivariate cryptography only quadratic
multivariate maps were investigated. We have to admit that
general interest in various aspects of multivariate
cryptography was connected with the search for secure and
effective procedures of digital signature where mentioned
above ROUV cryptosystem was taken as a serious candidate
to make the shortest signature.</p>
      <p>Let us summarize the outcomes of the mentioned above
NIST tender.</p>
      <p>There are 5 categories that were considered by NIST in
the PQC standardization (the submission date was 2017; in
July 2022, the 4 winners and the 4 final candidates were
proposed for the 4th round—this is the current official status.
However, the current 8 final winners and candidates only
belong to the following 4 different mathematical problems
(not the 5 announced at the beginning):



</p>
      <p>The standards are partially published in 2024.</p>
      <p>0000-0002-2138-2357 (V. Ustimenko);
0000-0002-3232-1787 (O. Pustovit)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).
It’s interesting that the new obfuscation “TUOV: Triangular
Unbalanced Oil and Vinegar” was presented to NIST by
principal submitter Jintaj Ding [4].</p>
      <p>
        The historical development of Classical Multivariate
Cryptography which studies quadratic and cubic
endomorphisms of Fq[x1, x2,…, xn] can be found in [5] and
[6]. Current research in Postquantum Cryptography can be
found in [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21 ref22 ref6 ref7 ref8 ref9">5, 7–23</xref>
        ].
      </p>
      <p>Section 2 contains some definitions of Multivariate
Cryptography over a general commutative ring.</p>
      <p>In Section 3 we introduce the concept of linguistic
graphs and Jordan-Gauss graphs defined over commutative
ring K together with the examples of such graphs which
appear as bipartite-induced subgraphs of the Incidence
Graph of Projective Geometry or its analogue defined over
K.</p>
      <p>Equations of some graphs are given explicitly. We
define the temporal analogue of linguistic graphs.</p>
      <p>Section 4 is dedicated to the constructions of
multivariate rules with trapdoor accelerators in terms of
linguistic graphs. In the case of Cellular Schubert graphs or
their temporal analogue we evaluate the density of
constructed multivariate rules.</p>
      <p>In Section 5 we describe the Eulerian subgroup of
transformations of Affene Cremona semigroup of all
endomorphisms of K[x1, x2,…, xn]. Eulerian transformation
maps each variable x_i into a monomial term.</p>
      <p>The new cryptosystem is described in Section 6. This
map is formed as the composition of Eulerian
transformation J, transformation F defined in terms of
special Jordan-Gauss graphs in Section 4, and element L
from AGLn(K). The complexity of the decryption procedure
is estimated there.</p>
      <p>Section 7 contains concluding remarks.</p>
    </sec>
    <sec id="sec-2">
      <title>2. On the tasks of multivariate cryptography over arbitrary finite commutative ring</title>
      <p>This paper is dedicated to the construction of public maps F
of multivariate cryptography transforming the tuple (x1, x2,
..., xn) from Kn to (f1(x1, x2, ..., xn), f2(x1, x2, ..., xn), ..., fk(x1, x2,
..., xn)) from Kk where K is a finite commutative ring with
unity and polynomials fiϵK[x1, x2, ..., xn] are written in their
standard forms, i.e. lists of their monomial terms ordered
lexicographically.</p>
      <p>We say that piece of information T is a trapdoor
accelerator of F if T is the piece of information such that its
knowledge allows us to compute the reimage of F for given
value b from Kk in a polynomial time O(nα).</p>
      <p>Classical multivariate cryptography uses surjective map
F defined over finite field K=Fq with the trapdoor accelerator
T. Correspondents Alice and Bob use the following scheme.</p>
      <p>Map F is announced publicly. Alice has the knowledge
of T. Alice and Bob have some digest (hash value) b=(b1, b2,
..., bk)ϵKk of the document. To sign the document Alice
solves the system of equations fi(x)=bi, i=1, 2, ..., k. She gets
a solution x1=d1, x2=d2, ..., xn=dn and sends the tuple d=(d1, d2,
..., dn). Public user Bob verifies that F(d)=b.</p>
      <p>If k=n then the pair (F, T) can be used as the encryption
scheme. Bob writes his plaintext p=(p1, p2, ..., pn) and forms
the ciphertext c=F(p). He sends c to Alice via the open
channel. Her knowledge of T allows Alice to restore p as
F1(c).</p>
      <p>In both schemes, correspondents would like to use F as
one way function for which reimages of b or p are
impossible to compute in polynomial time without the
knowledge of T.</p>
      <p>The search for multivariate one way functions is
motivated by the following gap between linearity and
nonlinearity.</p>
      <p>
        We know that the system of linear equations written over
the field F can be solved in time O(n3) via the Jordan-Gauss
elimination method. The complexity of solving a nonlinear
system of constant degree d, d&gt;1 is subexponential (see [
        <xref ref-type="bibr" rid="ref23 ref24">24,
25</xref>
        ]). Despite the convenience of the Groebner-Shirshov basis
method [
        <xref ref-type="bibr" rid="ref25">26</xref>
        ] for the implementation the complexity of this
algorithm is equivalent to the old Gauss elimination method
for the solution of the system of nonlinear equations. There is
a standard way to transform of nonlinear system of equation
of degree d, d&gt;2 to an equivalent quadratic system via the
introduction of additional variables and substitutions (see
[5]).
      </p>
      <p>So if we have a nonlinear map F of bounded degree d in
“general position” which has a trapdoor accelerator T then
the corresponding cryptosystem is secure. This status
insures the fact that F is given as one way function i.e.
reimage of F is impossible to compute in a polynomial time
without knowledge of the secret T.</p>
      <p>The map F is not in a “general position” if some
additional specific information is known. For instance, if F
is the bijective cubic map and F-1 is also cubic. The public
user can generate O(n3) pairs of kind plaintext
p/corresponding ciphertext c and approximate inverse map
in time O(n10).</p>
      <p>Known computer tests and cryptanalytic methods
ensure that map F is “in general position”. Noteworthy that
the existence of one way function is not proven yet even
under the main complexity conjecture that P≠NP.</p>
      <p>It is well known that the investigation of nonlinear
systems of equations over the commutative ring K with zero
divisors is essentially a harder case in comparison to the
case of a field.</p>
      <p>Multivariate cryptography over rings with zero divisors
is a brand new direction of research. Another idea is the
construction of functions F of unbounded degree of size O(n)
with the trapdoor accelerators. As we already mentioned
there is a reduction of arbitrary system of nonlinear
equations to the system of quadratic equations. This method
leads to the nonlinear increase of a number of variables. The
change of practically used hundreds of variables for several
thousands of them makes it impossible to use the Groebner
basis technique as a cryptanalytical instrument. The
adversary has the luck of computational resources to break
the cryptosystem.</p>
      <p>We will combine both ideas for the construction of new
multivariate public keys for the task of information
exchange within the following general scheme.</p>
      <p>Let K be a commutative ring with nontrivial
multiplicative group K*.</p>
      <p>We consider the multivariate map F of Kn into Kn given
by the rule xi→fi(x1, x2, ..., xn) such that its restriction on
(K*)n is injective. We say that T is a multiplicative trapdoor
of F if the knowledge of T allows us to solve the system of
equations F(x)=b for bϵF((K*)n).</p>
      <p>Assume that the density of F is O(nd) where d is some
constant. Then the public rule x→F(x) can be used as an
encryption scheme with the space of plaintexts (K*)n and the
space of ciphertexts (Kn).</p>
      <p>Assume that Alice has a pair (F, T) and public user Bob
has the standard form of F.</p>
      <p>Then he writes his plaintext p=(p1, p2, ...., pn) and sends
the ciphertext c=F(p) to Alice. She uses the information
piece T and computes the plaintext.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Linguistic and Jordan-Gauss graphs and their temporal analogs</title>
      <p>
        The missing definitions of graph-theoretical concepts and
incidence systems theory which appear in this paper can be
found in each of the books [
        <xref ref-type="bibr" rid="ref26 ref27 ref28 ref29">27–30</xref>
        ].
      </p>
      <p>All graphs we consider are simple graphs, i.e. undirected
without loops and multiple edges. Let V(G) and E(G) denote
the set of vertexes and the set of edges of G respectively.
When it is convenient, we shall identify G with the
corresponding anti-reflexive binary relation on V(G), i.e.
E(G) is a subset of Cartesian product V(G)∙V(G) and write v
G u for the adjacent vertexes u and v (or neighbours). We
refer to |{x ϵ V(G)|xGv}| as the degree of the vertex v. The
incidence structure is the set V with partition sets P (points)
and L (lines) and symmetric binary relation I such that the
incidence of two elements implies that one of them is a point
and another one is a line. We shall identify I with the simple
graph of this incidence relation or bipartite graph.</p>
      <p>
        We define linguistic graphs of type ( ,  ,  ) where  &gt;0,
 &gt;0,  &gt;0 over the commutative ring  with unity as
bipartite graphs with the partition sets  = s+m and
 = r+m such that the point ( 1,  2, …,  s,  s+1,  s+2, …,  s+m)
from  is incident to the line [ 1,  2, …,  r,  r+1,  r+2, …,  r+m]
from  if and only if the following equations are satisfied:
 j s+j- j s+j= j( 1,  2, …,  s+j-1,  1,  2, …,  t+j-1) (1)
where  j and  j are elements of the multiplicative group of
 and  j are polynomials from  [ 1,  2, …,  s+j-1,  1,  2, …,
 r+j-1] (see [
        <xref ref-type="bibr" rid="ref30">31</xref>
        ]).
      </p>
      <p>We say that a linguistic graph is a Jordan-Gauss graph
if polynomials  j have degree 2 and consist of monomial
terms of kind  i k for  =1, 2, …,  .</p>
      <p>The neighbourhood of each vertex of a general
JordanGauss graph is given by the system of linear equations in its
row-echelon form.</p>
      <p>
        Examples of families of Jordan-Gauss graphs can be
obtained as induced subgraphs of the incidence graphs of
geometries of Chevalley groups (see [
        <xref ref-type="bibr" rid="ref31">32</xref>
        ]) defined over
various fields (see [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ], [
        <xref ref-type="bibr" rid="ref32">33</xref>
        ] and further references).
      </p>
      <p>Let us consider the case of Coxeter-Dynkin diagram  n,
i.e. projective geometry PGn(F) of dimension n over the field
F. This incidence system is a totality PGn(F) of proper
nontrivial subspaces of the vector space Fn+1.</p>
      <p>The dimension t(W) of subspace defines the type of W.
So the set Pn(F) is a disjoint union of Grassmanians Гi(F)={W:
t(W)=i}, i=1,2, ..., n-1. Two elements 1W and 2W are incident
(1W I 2W) if they have different types and 1W&lt;2W or 2W&lt;1W.</p>
      <p>We identify the binary relation I with the corresponding
multipartite graph.</p>
      <p>Let i,jГ(F) be the bipartite graph of the restriction of I on
the disjoint union of Grassmanians Гi(F) and Гj(F).</p>
      <p>The Borel subgroup B of algebraic group PGLn(K)
consists of triangular matrices A=(ai,j): such that ai,j=0 if i&lt;j
with determinant 1.</p>
      <p>Let us consider the orbits of group B acting on PGn(F).
For the description of orbits, we select the standard basis e1,
e2, ..., en, en+1 of the vector space Fn+1.</p>
      <p>Then each orbit OJ from Гm(F) contains the unique
symplectic subspace of kind ej(1), ej(2), ..., ej(m) where J={i(1),
i(2), ...,i(m)} is a subset of {1, 2, ..., n, n+1}. There is a subgroup
U(J) of unitriangular elements from GLn+1(F) which consists
of matrices E+(ai,j ) such that ai,j≠0 if (iϵiϵJ)&amp;(j &amp;N-J)&amp;(i&gt;j).</p>
      <p>The transitive group of transformation (U(J), OJ) is a
regular representation of abstract group U(J), i.e. stabilisator
of each representative of the orbit is the unity subgroup.
Thus there are natural one-to-one correspondence between
elements U(J) and OJ and we can identify these sets.</p>
      <p>Elements of orbits U(J) and U(J’) are not incident unless
the condition</p>
      <p>J⸦J’ or J’⸦J and |J|≠|J’| (2)
holds, i.e. elements J and J’ are incident as elements of Weyl
geometry An.</p>
      <p>For the description of the incidence condition of
elements MϵU(J) we introduce subset ∆(J)={(i,j)|(iϵiϵJ)&amp;(j
&amp;N-J)&amp;(i&gt;j)}.</p>
      <p>We define the projection of triangular matrix M=(m(i,j))
on the subset A of {(i, j): i&gt;j} as function f from A to such that
f(i,j)=m(i,j) for (i,j)ϵA.</p>
      <p>Each unit triangular matrix M from U(J) is uniquely
determined by its projection on ∆(J).</p>
      <p>Let M and M’ be elements of U(J) and U(J’) where J and
J’ are incident elements of Weyl geometry. Then M and M’
are incident elements of projective geometry if and only if
(M-M’) ∆(J)∩∆(J’)=(MM-M’M) 1∆(J)∩∆(J’) (3)</p>
      <p>It is easy to see that the bipartite graph FG(J, J’) with
partition sets U(J) and U(J’) where J and J’ are incident
elements of Weyl geometry and incidents of points and lines
are defined by the condition (2) is a Jordan-Gauss graph.</p>
      <p>Noteworthy that the coefficients of monomial terms in
the system of equations (2) are +1 and -1. So we can
introduce KG(J, J) over arbitrary commutative ring K with
unity via the direct change of F for K. We can consider
unimportant subgroup UK(J) of the group of unitriangular
matrices U(n+1, K) over K and define the incidence of
elements UK(J) and UK(J’) by the condition 2 in the case
when J and J’ satisfy (1).</p>
      <p>In fact, we can define PGn(K) in the case of general
commutative ring with unity as disjoint union of partition
sets of bipartite graphs KG(J, J’), type function t(x) of xϵUK(J)
equals |J| for the incidence xϵUK(J) and y ϵUK(J’) the
condition (1) is necessary, if (1) holds then (2) is required
additionally.</p>
      <p>
        This approach of construction of incidence systems over
commutative ring K with unity can be used in the case of
other Dynkin-Coxeter diagrams, i.e.  n,  n,  n,  6,  7,  8,  4,
 2 (see [
        <xref ref-type="bibr" rid="ref27">28</xref>
        ], [
        <xref ref-type="bibr" rid="ref31">32</xref>
        ]).
      </p>
      <p>
        Each Grassmanian Гm(K) is the union of affine spaces
UK(J) where |J|=m. These spaces are known as large
Schubert cells, small Schubert cells can be defined in the
case of field K (see [
        <xref ref-type="bibr" rid="ref33">34</xref>
        ], [
        <xref ref-type="bibr" rid="ref34">35</xref>
        ]) The variety Гm(K) contains the
unique largest Schubert cell which is the cell of maximal
dimension. It is easy to see that the largest Schubert cell of
Гm(K) is UK(J) for J={n+1, n, ..., n+1-m}.
      </p>
      <p>We refer to the disjoint union SPGn(K) of largest
Schubert cells as Schubert with the restriction of incidence
relation I of PGn(K) on this subset as Schubert system over
K. It is easy to see that for the incidence of elements x and y
from distinct Schubert cells the condition (3) is sufficient.</p>
      <p>Let Г(K) be a Jordan-Gauss graph of type ( ,  ,  ) where
 &gt;0,  &gt;0,  &gt;0 over the commutative ring  with unity with
the incidence given by conditions (1).</p>
      <p>We refer to the list  of all nonzero monomial terms of
 j taken with coefficient 1, together with the parameters  ,
 , m as the symbolic type of the Jordan-Gauss graph Г( ). It
is convenient that the symbolic type of a Jordan-Gauss
graph Г ( ) over  is independent of the choice of  . We
say that two Jordan-Gauss graphs defined over
commutative rings  and  ’ are symbolically equivalent if
they have the same symbolic type.</p>
      <p>
        We define a temporal (depending on time) Jordan-Gauss
graph Г( ) t of symbolic type  as the family of equivalent
Jordan-Gauss graphs Г( ) t,  =1, 2, … defined by equations
(1) with the same constant symbolic type  depending on
time  coefficients  i=ai(t),  i=bi(t) and nonzero monomial
terms of  j of the form j ( ,  ) i  k,  i  k ∈ , j ( ,  )=ja(i,
k)(t)≠0. Some examples of temporal Jordan-Gauss graphs
can be found in [
        <xref ref-type="bibr" rid="ref35">36</xref>
        ]. In contrast to the definition of
timedependent graphs of [
        <xref ref-type="bibr" rid="ref36">37</xref>
        ] we introduce Jordan-Gauss
temporal graphs via time-dependent equations.
      </p>
      <p>So we can introduce temporal analogue PGn(K)t of
PGn(K) and temporal analogue SPGn(K)t of SPGn(K) via the
option to change the coefficients of monomial terms of each
nontrivial induced subgraph GK(J, J’), j n(K).</p>
      <p>Let i, j n( ) be the bipartite-induced subgraph of SPGn(K)
of all elements of type i or type j. We refer to this graph as
a cellular Schubert graph and use the term temporal
Schubert Graph for SPGn (K).</p>
      <p>
        We refer to PGn(K)t and SPGn(K)t as temporal projective
geometry over K and say that SPGn(K)t is temporal Schubert
Geometry with the diagram An over the commutative ring
K. Temporal geometries of Chevalley groups and
corresponding Schubert geometries in the cases of various
Coxeter-Dynkin diagrams are defined in [
        <xref ref-type="bibr" rid="ref35">36</xref>
        ].
      </p>
      <p>Let us consider some illustration examples.</p>
      <p>The graph 1, n n( ) is a bipartite graph of points ( 1,  2,
…,  n) and lines [ 1,  2, …,  n] with incidences given by
equations:  n- n= 1 1+ 2 2+⋯+ n-1 n-1.</p>
      <p>This is symbolically equivalent to the 1,n n( ’)
JordanGauss graph over the ring  ’ with unity, having partition
sets isomorphic to ( ’)n and with incidences given by
equations of the form:  n- n= 1 1 1+ 2 2 2+⋯+ n-1 n-1,
where  and  are elements of the multiplicative group of
 ’ and  i≠0,  =1, 2, …,  -1.</p>
      <p>Graph 1, n n( )t has the same points and lines with 1,
n n(K) but the incidence is given by equations
 (t) n− (t) n= 1(t)x1 1+ 2 (t)x2 2+⋯+ n-1(t)xn-1yn-1.</p>
      <p>We say that i, j n( )t convert in fixed time moment t=t*
to static Jordan-Gauss graph i ,j n( )t |t=t* via selection of
values of “time-dependent” coefficients of monomial terms
of equations.</p>
      <p>In another example, the graph s, s+1 s+r( ) can be interpreted
as a bipartite graph consisting of points of the form ( 1,  2, …,
 s,  1,1,  1,2, …,  s,r) and lines [ 1,  2, …,  r,  1,1,  1,2, …,  s,r], with
the incidence condition given by the equations:
 i,j- i,j= iyj,  =1,2, …, s,  =1,2, …, r.</p>
      <p>This is symbolically equivalent to the graph s, s+1 s+r+1( ),
defined over the same commutative ring  and with an
incidence relation given by the system of equations:
 i,j i,j- i,jyi,j=di,j iyj, where elements  i,j and bi,j belong to
 * and di,j are elements from  ∖{0}.</p>
      <p>These two families of graphs give us extremal cases: the
incidence of points and hyperplanes from 1, n n( ) is the case
of the single equation, while the case of subspaces of
dimension s and s+1 of s, s+1 s+r+1( ) is the case when
polynomials of the right-hand side have a single monomial.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Jordan-Gauss graphs and the maps with the trapdoor accelerator</title>
      <p>Let us consider basic operators on the set of vertexes of the
linguistic graph of type (s, r, m).</p>
      <p>We refer to ρ((x))=(x1, x2, …, xs) for (x)=(x1, x2, …, xs+m)
and ρ([y])=(y1, y2, …, yr) for [y]=[y1, y2, …, yr+m] as the colour
of the point and the colour of the line respectively.</p>
      <p>For each bϵ Kr and p=(p1, p2, …, ps+m) there is the unique
neighbour of the point [l]=Nb(p) with the colour b. Similarly,
for each c ϵ Ks and line l=[l1, l2, …, lr+m] there is the unique
neighbour of the line (p)= Nc([l]) with the colour c. We refer
to operator of taking the neighbour of the vertex
accordingly chosen colour as neighbourhood operator.</p>
      <p>On the sets P and L of points and lines of the linguistic
graph we define colour jump operators J=Jb(p)=(b1, b2, …, bs,
p1, p2, …, ps+m), where (b1, b2, …, bs)ϵKs and J=Jb([l])=[b1, b2, …,
br, l1, l2, …, lr+m], where (b1, b2, …, br)ϵKr.</p>
      <p>For the point (p) and odd parameter l sequence of the
colours a(1)ϵKs, b(1) ϵKr, a(2)ϵKr , b(2) ϵKs, ...., a(l)ϵKs, b(l) ϵKr,
a(1+1) ϵKr which allows us to define the map H: Km+s→Km+r
moving arbitrary point (v) to the line h=h(a(1), b(1), a(2),
b(2), ..., a(l), b(l), a(l+1))(v)=vl+1 defined via the following
sequence of vertexes.</p>
      <p>v1=Ja(1)(v), u1=Nb(1)(v1),
v2=Ja(2)(v1), u2=Nb(2)(v2),
...,
vl=Ja(l)(vl-1), ul=Nb(l)(vl), vl+1=Ja(l+1)(ul). We refer to map H
as the transition of (v) in the direction (a(1), b(1), a(2), b(2),
..., a(l), b(l), a(l+1)).</p>
      <p>We can define the transition H(a(1), b(1), a(2), b(2), ...,
a(l), b(l), a(l+1)) in the case of even l in which v→h(v) will
be a transformation acting on Ks+m=P.</p>
      <p>For eachlinguistic graph Г(К) we consider Г'=Г(K[z1, z2,
..., zm+s]) given by the same equation but with the partition
sets K[z1, z2, ..., zm+s])m+s and K[z1, z2,..., zm+s])m+r.</p>
      <p>We take an odd parameter l, l&gt;2, special point z=(z1, z2,
..., zm+s) and apply the transition H(a(1), b(1), a(2), b(2), ...,
a(l), a(l+1)) to the vertex z of the graph Г’ such that
coordinates of a(i), b(i) are elements of K[[z1, z2,..., zs]. The
image of z will be the tuple u=(a(l+1)1(z1, z2,..., zs), a(l+1)2(z1,
z2,..., zs),..., a(l+1 )r(z1, z2,..., zs), f1(z1, z2,..., zm+s), f2(z1, z2,..., zm+s),
…, fm(z1, z2,..., zm+s)). Let F=F(a(1), b(1), a(2), b(2), ..., a(l),
a(l+1)) be a polynomial map of Km+s to Km+r sending (z1, z2, ...,
zm+s) to (u1, u2, ..., um+s])=u.</p>
      <p>We take two affine transformations L1 and L2 and
consider the composition G=L1FL2 sending (z1, z2, ..., zm+s) to
(g1(z1, z2, ..., zm+s), g2(z1, z2, ..., zm+s), …, gm+r(z1, z2,..., zm+s)).</p>
      <p>Additionally, we consider the above-presented
construction in the case of even parameter l Then a(l+1) is
an element of K[x1, x2, ..., xs]s, ul+1 and vl+1 are points. We
have to take L1 and L2 from AGLm+s(K) and construct the
transformation G=L1FL2 of the affine space Km+s.</p>
      <p>
        Proposition 1 [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ]. Let us assume that the surjective
map (z1, z2, ..., zs) to (a(l+1)1, a(l+1)2, ..., a(l+1)t) where t=r or
t=s has a trapdoor accelerator T.
      </p>
      <p>Then the knowledge on Г(К) and tuples a(1), b(1), a(2),
b(2). ..., a(l), b(l), transformations L1, L2, and T is a trapdoor
accelerator of the standard form of G mapping Km+s on Km+t.</p>
      <p>Justification of Proposition 1’.</p>
      <p>Let us assume that Г(К) is temporal graph and its static
graphs Гі in time i=1, 2, ..., l are known as well as a(1), b(1),
a(2), b(2), ..., a(l), b(l), a(l+1), T and L1, L2 of the Proposition
1. Let us consider the equation G(z)=b for the given value of
the tuple b.</p>
      <p>We compute (L2)-1 (b)=c and introduce intermediate
vector p=(p1, p2, ..., ps, ps+1, ps+2, ..., ps+m) of variables pi and
consider the equation H(p)=c where H=H(a(1), b(1), a(2),
b(2), ..., a(l), a(l+1))=(a(l+1)1, a(l+1)2, ...a(l+1)t, h1, h2,..., hm),
where hiϵK[x1, x2,..., xs+m].</p>
      <p>We use our knowledge of the trapdoor accelerator T to
get solution p1=d1, p2=d2, ..., ps=ds. Let d=(d1, d2,...,ds). It gives
us the opportunities to compute a*(1)=a(1)(d1, d2, ..., ds),
b*(1)=b(1)(d1, d2, ..., ds), a*(2)=a(2)(d1, d2, ..., ds), b*(2)=b(2)(d1,
d2, ..., ds), ..., a*(l)=a(l)(d1, d2, ..., ds), b*(l)=b(l)(d1, d2, ..., ds),
a*(1)=a(1)(d1, d2, ..., ds).</p>
      <p>So, we compute H(b*(l), a*(l), b*(l-1), a*(l-1), b*(1), a*(1),
d)= (w1, w2, ..., ws, ws+1, ws+2, ..., ws+m)=w.</p>
      <p>Thus we got a solution for H(p)=c. We compute the
solution z* of G(z)=c as z*=(L1)-1(w)).</p>
      <p>If l is even or r=1 then the reimage reimage z* is
uniquely defined.</p>
      <p>We define a density of multivariate polynomial f(z1, z2, ...,
zn) written in its standard form as a number of monomial terms.</p>
      <p>The density den(b) of the tuple b=(f1, f2, ..., fk) from K[z1,
z2, ..., zn]k is the maximal density of fi. The density of the map
F: xi→fi, i=1,2, ..., k coincides with the density of the
corresponding tuple of polynomials fi.</p>
      <p>
        Proposition 2 [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ]. Let us assume that condition of the
Proposition 1 hold and Г(К) coincides with the Jordan-Gauss
graph i,j n(K), den(a(i))=O(nd), den(b(i))=O(ne), d&gt;1, i-j=O(nk.),
0≤k≤1 for i=1,2, ..., l. Then the density of the map F(a(1), b(1),
a(2), b(2), ..., a(l), b(l), a(l+1)) is O(nd+e+k).
      </p>
      <p>Remark. Proposition 1 and Proposition 2 hold also for
the temporal linguistic graphs and temporal cellular
Schubert graphs.</p>
    </sec>
    <sec id="sec-5">
      <title>5. On some subgroups of affine</title>
    </sec>
    <sec id="sec-6">
      <title>Cremona Semigroup</title>
      <sec id="sec-6-1">
        <title>5.1. Some definitions</title>
        <p>Let us consider the following important object of
Noncommutative Cryptography. Affine Cremona</p>
        <p>
          Semigroup nCS(K) is defined as an endomorphism group of
polynomial ring K[x1, x2, ..., xn] over the commutative ring
K. It is an important object of Algebraic Geometry (see [
          <xref ref-type="bibr" rid="ref37">38</xref>
          ]
about mathematics of Luigi Cremona—a prominent figure
in Algebraic Geometry in XIX).
        </p>
        <p>
          Element of the semigroup σ can be given via its values
on variables, i.e. as the rule xi→fi(x1, x2, …, xn), i=1, 2, …, n.
This rule induces the map σ’: (a1, a2,.., an)→(f1(a1, a2, ..., an),
f2(x1, x2, …, xn), …, fn(x1, x2, …, xn)) on the free module Kn.
Automorphisms of K[x1, x2, ..., xn] form affine Cremona
GroupnCG(K) (see [
          <xref ref-type="bibr" rid="ref38">39</xref>
          ]).
        </p>
        <p>In the case when K is a finite field or arithmetic ring Zm
of residues modulo m elements of affine Cremona Groups
or Semigroups are used in algorithms of multivariate
cryptography. Results about subsemigroups S of nCS(K) (or
subgroups of nCG(K) such that computation of the
superposition of arbitrary n elements can be completed for
polynomial time can be used as so-called platforms of
Noncommutative Cryptography.</p>
        <p>One class of such objects is formed by stable
subsemigroups of degree k, i.e. subsemigroup S such that the
maximal degree of its representative is bounded by the
constant k. We will talk about the Multiple Composition
Computability (MCC) property. In the case of k=1 one can
take AGLn(K), stable subsemigroups of degree k in nCG(K)
exist for each k, k=2, 3, ... Affine Cremona semigroup nCS(K)
does not pose MCC. If one takes n quadratic elements
randomly their product with a probability close to 1 will
have degree 2n. So the computation is not feasible.</p>
        <p>EXAMPLE: Let us consider the totality nES(K) of
endomorphisms of K[x1, x2, ..., xn] of kind
x1→ϻ1x1 a(1,1) x2 a(1,2) … xn a(1,n),
x2→ϻ2x1 a(2,1) x2 a(2,2) … xn a(2,n),
(4)
…
xm→ϻnx1 a(n,1) x2 a(n,2) … xn a(n,n)
where ϻi are regular elements of finite commutative ring K
with unity.</p>
        <p>It is easy to see that the complexity of the computation
of the product of two elements of kind (4) is O(n3). So, the
semigroup of Eulerian transformations nES(K) poses the
property MCC. Semigroups with this property can serve as
“platforms” of protocols of Noncommutative Cryptography.</p>
        <p>
          The following examples of special elements of nES(K)
can be found in [
          <xref ref-type="bibr" rid="ref39">40</xref>
          ].
        </p>
      </sec>
      <sec id="sec-6-2">
        <title>5.2. On some bijective transformation of</title>
        <p>(K*)n
Let π and δ be two permutations on the set {1, 2, ..., n}. Let K
be a commutative ring with unity which has nontrivial
multiplicative group K* of order d=|K*|&gt;1 and n≥1. We
define transformation AJG(π, δ) of the variety (K*)n, where
A is a triangular matrix with positive integer entries
0≤a(i,j)≤d, i≥d defined by the following closed formula.
yπ(1)=ϻ1xδ(1)a(1,1)
yπ(2)= ϻ2xδ(1)a(2,1) xδ(2)a(2,2)
…
yπ(n)= ϻnxδ(1)a(n,1) xδ(2)a(n,2) …xδ(n)a(n,n)
where (a(1,1),d)=1, (a(2,2),d)=1,…,(a(n,n),d)=1.</p>
        <p>
          We refer to AJG(π, δ) as Jordan transformations Gauss
multiplicative transformation, or simply JG element. It is an
invertible element of nES(K) with the inverse of kind BJG(δ,
π) such that a(i,i)b(i,i)=1 (mod d). Notice that in the case
K=Zm straightforward process of computation the inverse of
JG element is connected with the factorization problem of
integer m. If n=1 and m is a product of two large primes p
and q the complexity of the problem is used in the RSA
public key algorithm. The idea to use the composition of JG
elements or their generalisations with injective maps of Kn
into Kn was used in [
          <xref ref-type="bibr" rid="ref40">41</xref>
          ] (K=Zm) and [
          <xref ref-type="bibr" rid="ref41">42</xref>
          ] (K=Fq.).
        </p>
        <p>We say that τ is a tame Eulerian element over the
commutative ring K if it is a composition of several Jordan
Gauss multiplicative maps over a commutative ring or field
respectively. It is clear that τ sends variable xi to a certain
monomial term. The decomposition of τ into a product of
Jordan Gauss transformation allows us to find the solution
of equations τ(x) = b for x from (Z*m)n or (F*q)m. So tame
Eulerian transformations over Zm or Fq are special elements
of nEG(Zm) or nEG(Fq) respectively.</p>
        <p>We refer to elements of nES(K) as multiplicative
Cremona elements. Assume that the order of K is constant.
As it follows from the definition the computation of the
value of element from nES(K) on the given element of Kn is
estimated by O(n2). The product of two multiplicative
Cremona elements can be computed in time O(n3).</p>
        <p>We are not discussing here the complexity of computing
the inverse for general element gϵ nEG(K) on the Turing
machine or Quantum computer and the problem of finding
the inverse for tame Eulerian elements.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>6. Multivariate cryptosystem</title>
      <p>Let K be a finite commutative ring with unity and nontrivial
multiplicative group K* of order d&gt;1. Alice selects graph
i, j 2m( ), i&gt;j, i=m+α, j=m-β where α&gt;0 and β ≥0 are
constants ≥0. We assume that parameters α and β are
essentially smaller than n. She computes parameter
n=(m+α)(m-α+1) and s=(m+α-1)(α+ β), r=(m-β)(α+β) and
forms the transformation J1 and J2 from nEG(K) of kind
y1=μ1x1a(1,1)
y2=μ2x1a(2,1) x2a(2,2)
…
yn=μnx1a(n,1) x2a(n,2) … xna(n,n)
where (a(1,1), d)=1, (a(2, 2), d)=1, …, (a(n, n), d)=1,
z1=μ’1y1b(1,1) y2b(1,2) … ynb(1,n)
z2=μ’1y2b(2,2) y2b(2,3) … ynb(2,n)
…
zn=μ’nynb(n,n)
where (b(n,n), d)=1, (b(n-1, 2), d)=1, …, (b(1, n), d)=1.</p>
      <p>She computes the composition of J1 and J2 and obtains
the vector (z1, z2, ..., zs, zs+1, …, zn) and treats this tuple as a
point of graph i, j 2m( ).</p>
      <p>She selects even parameter l, l&gt;5 of size O(1) together
with sparse tuples a(1), b(1), a(2), b(2), …, a(l), b(l), a(l+1) of
density O(1) of Proposition 2.</p>
      <p>So, a(i)=(il1(z1, z2, …, zs), il2(z1, z2, …, zs), …, ils(z1, z2, …, zs))
for i=1, 3, 5, …, l-1, l+1,</p>
      <p>a(i)=(il1(z1, z2, …, zs), il2(z1, z2, …, zs), …, ilr(z1, z2, …, zs)) for
i=2, 4,…, l,</p>
      <p>b(i)=(ih1(z1, z2, …, zs), ih2(z1, z2, …, zs), …, ihr(z1, z2, …, zs))
for i=1, 3, …, l-1,</p>
      <p>b(i)=(ih1(z1, z2, …, zs), ih2(z1, z2, …, zs), …, ihs(z1, z2, …, zs))
for i=2, 4, …, l.</p>
      <p>Alice selects a(l+1) as a tuple of kind
(λ1z1e(1,1), λ2z1e(2,1)z2e(2,2), ...,
λsz1e(s,1)z2e(s,2) … zs(s,s)) where (e(1, 1), d)=1, e(2, 2), d)=1, …,
(e(s, s), d)=1.</p>
      <p>Alice computes F(z1, z2, …, zn)=(F(a(1), b(1), a(2), b(2),
..., a(l), b(l), a(l+1)) (z1, z2, …, zn)=(u1, u2, …, un)=u.</p>
      <p>She takes element L from AGLn(K) and computes
L(u)=(w1, w2, …, wn). So Alice computes the composition
G=J1J2FL:(x1, x2, …, xn)→(w1(x1, x2, …, xn), w2(x1, x2, …, xn), …,
wn(x1, x2, …, xn)).</p>
      <p>She sends standard forms of multivariate polynomials
wi to Bob. Alice keeps J1, J2, L and a(1), b(1), a(2), b(2), ...,
a(l), b(l), a(l+1) as her private secret.</p>
      <p>Encryption.</p>
      <p>Bob generates his message p=(p1, p2, ..., pn) from the
space of plaintexts (K*)n. He creates the ciphertext G(p1, p2,
..., pn)=c and sends it to Alice.</p>
      <p>The process of generating G insures that the density of
the map is O(n). Each monomial can be computed in time
O(n). Thus the complexity of the encryption procedure is
O(n3).</p>
      <p>We have a nonlinear map of an unbounded degree such
that the computation of its value has the same complexity
as the computation of an image of a quadratic map.</p>
      <p>Decryption.</p>
      <p>Alice receives the message c from Bob. Firstly she
computes b=L-1(c). Secondly Alice creates the intermediate
tuple (z1, z2, ..., zn) to study equation F(z1, z2, ..., zn)=b.</p>
      <p>She writes the equation</p>
      <p>λ1z1e(1,1)=b1,
λ2z1e(2,1)z2e(2,2)=b2,
(5)
…
λsz1e(s,1) z2e(s,2) …zse(s,s)=bs
Alice gets the solution z1=d1, z2=d2, ..., zs=ds.</p>
      <p>She computes the parameters a*(i)=a(i)(d1, d2, ..., ds) and
b*(i)=b(i)(d1, d2, ..., ds) for i=1, 2,..., l.</p>
      <p>Alice takes point (b) and computes recurrently
ul=Jb*(l)(b), wl= Na*(l)(ul),
ul-1=Jb*(l-1)(wl), wl-1=Na*(l-1)(ul-1),
…,
u1=Jb*(1)(w2), w1=Na*(1)(u1),</p>
      <p>She computes z*=(z*1, z*2,..., z*s, z*s+1,..., z*n) as Jd(w1) for
d=(d1, d2,…, ds).</p>
      <p>We can see that z* is the solution of the system (3).
Alice computes the plaintext p as (J2)-1(Jl)-1(z*).</p>
      <p>Alice computes the inverses of J1 and J2 in the group
nEG(K) as well as the inverse of the map z1→λ1z1e(1,1),
z2→λ2z1e(2,1)z2e(2,2), ..., zs→ λsz1e(s,1)z2e(s,2) … zse(s,s) in the group
sEG(K) in advance. So the complexity of her decryption
procedure can be estimated as O(n2).</p>
      <p>Obfuscation.</p>
      <p>Instead of graphs i,j 2m( ) Alice takes temporal analogue
i,j 2m( ) t of them. She forms static graphs i,j 2m( )t|t=t* for
t*=1, 2, ..., l.</p>
      <p>So she computes each N_b(i) in static graph i,j 2m( )t|t=i
during the algorithm execution.</p>
      <p>Illustrating example.</p>
      <p>Let us consider the case (α=1, β=0).Then graph
m+1,mC2m(K) known as Double Schubert Graph which has
points (x)=(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m) and [y]=[y1, y2, ...,
ym, y1,1, y1,2, ..., ym,m] and incidence given by equations
xi,jyi,j=xiyj. We assume that indexes of kind (i,j) are ordered
lexicographically.</p>
      <p>Alice takes endomorphism J1 and J2 of K[x1, x2, ..., ,..., xm,
x1,1, x1,2, ..., xm,m].</p>
      <p>J1J2(x)=(a1(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m), a2(x1, x2, ..., xm,
x1,1, x1,2, ..., xm,m), …,
am(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m),
a1,1(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m),
a1,2(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m),
…,
am,m(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m))=(z1, z2, …, zm, z1,1, z1,2,
…, zm,m)=(z) where expressions a1, a2, …, am, a1,1, a1,2, …, am,m
are monomial terms with the coefficients from K*.</p>
      <p>Alice takes graph m+1,mC2m(K[z1, z2, …, zm, z1,1, z1,2, …,
zm,m]). She selects colours a(1), b(1), a(2), b(2), ..., a(l), b(l),
a(l+1) where a(i) and b(i) are elements of K[z1, z2, ..., zm, z1,1,
z1,2, …, zm,m]m. Element a(l+1) will be chosen as (λ1z1e(1,1),
λ2z1e(2,1)z2e(2,2), ..., λsz1e(s,1)z2e(s,2) … zse(s,s)). She computes the
destination point of transition H(a(1), b(1), a(2), b(2), ..., a(l),
b(l), a(l+1)) of the point (z) in the graph m+1,mC2m(K[z1, z2, …,
zm, z1,1, z1,2, …, zm,m]). Alice specialise zi as ai(x) and zi,j as
ai,j(x).</p>
      <p>So she computes the composition of J=J1J2 moving (x) to
(z) and F(a(1), b(1), a(2), b(2), ..., a(l), b(l), a(l+1) moving z to
u=(u1, u2, ..., um, u1,1, u1,2, ..., um,m). It is clear that the density
of JF is O(1). Finally Alice selects L from AGLn(K), n=(m+1)m
and computes (JF)L=G(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m) of kind
x1→g1(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m),
x2→g2(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m),
...,
xm→gm(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m),
x1,1→g1,1(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m),
x1,2→g1,2(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m),
...
xm,m→gm,m(x1, x2, ..., xm, x1,1, x1,2, ..., xm,m).</p>
      <p>For convenience Alice can rename variables from the
list x1, x2, ..., xm, x1,1, x1,2, ..., xm,m as y1, y2, ..., ym, xm+1, xm+2, ...,
xm(m+1).</p>
    </sec>
    <sec id="sec-8">
      <title>7. Conclusions</title>
      <p>In this paper, we present the method of construction of
sparce multivariate maps of unbounded degree O(n) with
the trapdoor accelerators with the use of walks on algebraic
graphs. It uses bipartite cellular Schubert graphs of
projective geometries and their analogues defined over the
general commutative ring K with the unity. These bipartite
graphs can be changed for their temporal analogues defined
via the option of a momentum change of the coefficients of
monomial terms in the equations defining the incidence of
points and lines.</p>
      <p>
        The partition sets of such graphs are affine spaces Kn
and Km. The special walk on the temporal graph over K [x1,
x2, ..., xn] can be used for the construction of a multivariate
map G from Kn to Kn. The information on the temporal
graph and the walk can serve as corresponding trapdoor
accelerator T of G, i.e. the knowledge of T allows us to
compute the reimages of G. We presented some of these
procedures as Algorithm 1 and 4 in the case of graphs
s,kCn(K) in terms of Chevalley group over the diagram An
(case of general linear group). Some other maps with
trapdoor accelerators are described in [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ] the cases of
diagrams Bn, Cn, and Dn.
      </p>
      <p>The first graph-based bijective quadratic public key
where constructed in [6]. It uses special cellular Schubert
graphs of Projective Geometry over the finite field of
characteristics 2. The cryptanalysis for this public key is
unknown.</p>
      <p>
        The obfuscation of this cryptosystem is presented in [1].
Recent development in this direction is reflected in [
        <xref ref-type="bibr" rid="ref32">33</xref>
        ]
where multivariate rules given by quadratic surjective maps
and temporal analogues of cellular Schubert graphs can be
used.
      </p>
      <p>
        Another bijective quadratic cryptosystem which is also
constructed in terms of Jordan-Gauss graphs is given in [
        <xref ref-type="bibr" rid="ref42">43</xref>
        ].
      </p>
      <p>
        Multivariate cryptosystems with rules of unbounded
degree are quite rare. We refer to cryptosystems [
        <xref ref-type="bibr" rid="ref41">42</xref>
        ] and
[
        <xref ref-type="bibr" rid="ref40">41</xref>
        ] defined in terms of extremal Jordan-Gauss graphs over
Fq and Zq.
      </p>
      <p>These multivariate maps have O(n4) monomial maps.
Cryptanalysis for them is still unknown. Presented in this
paper cryptosystem is given by multivariate rule with O(n2)
monomial terms. Thus it can be implemented with hundreds
of variables, The reduction of the degree of equations to 2
or 3 leads to an essential increase of variables (more than
n2). It makes it unfeasible to use standard methods of
symbolic computations for cryptanalytic purposes.</p>
      <p>For the implementation of this public key, we select
cases K=Fq and K=Zq where q is a prime power ≥128.</p>
    </sec>
    <sec id="sec-9">
      <title>Acknowledgments</title>
      <p>This research is partially supported by the British Academy
Fellowship for Researchers under Risk 2022 and partially
supported by the British Academy grant LTRSF\100333.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>Linear Codes of Schubert Type and Quadratic Public Keys of Multivariate Cryptography, IACR e-print archive (</article-title>
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>W.</given-names>
            <surname>Beullens</surname>
          </string-name>
          ,
          <article-title>Improved Cryptanalysis of UOV and Rainbow</article-title>
          ,
          <source>Advances in Cryptology - EUROCRYPT</source>
          <year>2021</year>
          , LNCS
          <volume>12696</volume>
          (
          <year>2021</year>
          )
          <fpage>348</fpage>
          -
          <lpage>373</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77870-5_
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Canteaut</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.-X.</given-names>
            <surname>Standaert</surname>
          </string-name>
          ,
          <year>Eurocrypt 2021</year>
          ,
          <article-title>LNCS 12696, 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (</article-title>
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77870-5.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Ding</surname>
          </string-name>
          , et al.,
          <source>TUOV: Triangular Unbalanced Oil and Vinegar. Algorithm Specifications and Supporting Documentation, ver. 1</source>
          .
          <issue>0</issue>
          (
          <year>2023</year>
          ). URL: https://csrc.nist.gov/csrc/media/Projects/pqc-digsig/documents/round-1/spec-files/TUOV-specweb.
          <source>pdf J</source>
          .
          <string-name>
            <surname>Ding</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Petzoldt</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Schmidt</surname>
            , Multivariate Public Key Cryptosystems,
            <given-names>Second</given-names>
          </string-name>
          <string-name>
            <surname>Edition</surname>
          </string-name>
          .
          <source>Advances in Information Security</source>
          , Springer (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On Schubert cells in Grassmanians and New Algorithms of Multivariate Cryptography</article-title>
          ,
          <source>Proceedings of the Institut of Mathematics</source>
          ,
          <volume>23</volume>
          (
          <issue>2</issue>
          ) (
          <year>2015</year>
          )
          <fpage>137</fpage>
          -
          <lpage>148</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Petzoldt</surname>
          </string-name>
          , Current State of Multivariate Cryptography,
          <source>in IEEE Security &amp; Privacy</source>
          ,
          <volume>15</volume>
          (
          <issue>4</issue>
          ) (
          <year>2017</year>
          )
          <fpage>28</fpage>
          -
          <lpage>36</lpage>
          . doi:
          <volume>10</volume>
          .1109/MSP.
          <year>2017</year>
          .
          <volume>3151328</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Smith-Tone</surname>
          </string-name>
          ,
          <article-title>2F-A New Method for Constructing Efficient Multivariate Encryption Schemes</article-title>
          ,
          <source>in: Proceedings of PQCrypto</source>
          <year>2022</year>
          :
          <article-title>The 13th International Conference on Post-Quantum Cryptography, virtual</article-title>
          , DC, US (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Smith-Tone</surname>
          </string-name>
          ,
          <article-title>New Practical Multivariate Signatures from a Nonlinear Modifier, IACR e-print archive (</article-title>
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Smith-Tone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Tone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Nonlinear</given-names>
            <surname>Multivariate</surname>
          </string-name>
          <article-title>Cryptosystem Based on a Random Linear Code (</article-title>
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Dey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Dutta</surname>
          </string-name>
          , Progress in Multivariate Cryptography: Systematic Review, Challenges, and Research Directions, ACM Computing Survey,
          <volume>55</volume>
          (
          <issue>12</issue>
          ) (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>34</lpage>
          . doi:
          <volume>10</volume>
          .1145/3571071.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Cabarcas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Cabarcas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Baena</surname>
          </string-name>
          , Efficient PublicKey Operation in Multivariate Schemes,
          <source>Advances in Mathematics of Communications</source>
          <volume>13</volume>
          (
          <issue>2</issue>
          ) (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Cartor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Smith-Tone</surname>
          </string-name>
          ,
          <article-title>EFLASH: A New Multivariate Encryption Scheme</article-title>
          , International Conference on Selected Areas in Cryptography (
          <year>2018</year>
          )
          <fpage>281</fpage>
          -
          <lpage>299</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Casanova</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Gemss</surname>
            :
            <given-names>A Great</given-names>
          </string-name>
          <string-name>
            <surname>Multivariate Short Signature</surname>
          </string-name>
          , Submission to NIST (
          <year>2017</year>
          )
          <fpage>209</fpage>
          -
          <lpage>229</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          , et al.,
          <source>A New Encryption Scheme For Multivariate Quadratic Systems, Theoretical Comput. Sci</source>
          .
          <volume>809</volume>
          (
          <year>2020</year>
          )
          <fpage>372</fpage>
          -
          <lpage>383</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <surname>M.-S. Chen</surname>
          </string-name>
          , et al.,
          <article-title>SOFIA: MQ-based Signatures in the QROM</article-title>
          , IACR International Workshop on Public Key Cryptography, LNCS
          <volume>10770</volume>
          (
          <year>2018</year>
          )
          <fpage>3</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>D. H.</given-names>
            <surname>Duong</surname>
          </string-name>
          , et al.,
          <article-title>An Efficient Multivariate Threshold Ring Signature Scheme</article-title>
          ,
          <source>Computer Standards &amp; Interfaces</source>
          <volume>74</volume>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <surname>J.-C. Faugère</surname>
          </string-name>
          , et al.,
          <article-title>A New Perturbation for multivariate public key schemes such as HFE and UOV</article-title>
          , Cryptology ePrint Archive (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <surname>M. J. Saarinen</surname>
          </string-name>
          , Daniel Tony-Smith, Post Quantum Cryptography, in: 15th International Workshop, PQCrypto 2024,
          <article-title>Part 1 (</article-title>
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <surname>M. J. Saarinen</surname>
          </string-name>
          , DTony-Smith (eds.),
          <source>Post Quantum Cryptography</source>
          , 15th International Workshop, PQCrypto 2024,
          <article-title>Part 2 (</article-title>
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>T.</given-names>
            <surname>Takagi</surname>
          </string-name>
          , et al.,
          <source>International Symposium on Mathematics, Quantum Theory, and Cryptography, Proceedings of MQC</source>
          <year>2019</year>
          ,
          <string-name>
            <given-names>Open</given-names>
            <surname>Access</surname>
          </string-name>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>K.</given-names>
            <surname>Arai</surname>
          </string-name>
          ,
          <source>Advances in Information and Communication</source>
          ,
          <source>Future of Information and Communication Conference (FICC)</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          .
          <article-title>Graphs in terms of Algebraic Geometry, Symbolic Computations and Secure Communications in Post-Quantum world</article-title>
          ,
          <source>UMCS Editorial House</source>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>B.</given-names>
            <surname>Sturmfels</surname>
          </string-name>
          .
          <source>Solving Systems of Polynomial Equations</source>
          . Providence, RI: American Mathematical Soc. (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J. F.</given-names>
            <surname>Canny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Kaltofen</surname>
          </string-name>
          , L. Yagati,
          <source>Solving Systems of Nonlinear Polynomial Equations Faster, ISSAC '89: Proceedings of the ACM-SIGSAM 1989 International Symposium on Symbolic and Algebraic Computation</source>
          (
          <year>1989</year>
          )
          <fpage>121</fpage>
          -
          <lpage>128</lpage>
          . doi:
          <volume>10</volume>
          .1145/74540.74556.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>B.</given-names>
            <surname>Buchberger</surname>
          </string-name>
          ,
          <article-title>Groebner basis: An Algorithmic Method in Polynomial Ideal Theory, in: Recent Trends in Multidimensional Systems Theory (</article-title>
          <year>1985</year>
          )
          <fpage>184</fpage>
          -
          <lpage>232</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>N.</given-names>
            <surname>Biggs</surname>
          </string-name>
          , Algebraic graphs theory,
          <source>Second Edition</source>
          , Cambridge University Press (
          <year>1993</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>A.</given-names>
            <surname>Brower</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nuemaier</surname>
          </string-name>
          , Distance regular graphs, Springer (
          <year>1989</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bollob</surname>
          </string-name>
          ´as',
          <source>Extremal Graph Theory</source>
          , Academic Press (
          <year>1978</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>F.</given-names>
            <surname>Buekenhout</surname>
          </string-name>
          , Handbook on Incidence Geometry, North Holland (
          <year>1995</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          , Maximality of Affine Group,
          <article-title>Hidden Graph Cryptosystem and Graph's Stream Ciphers</article-title>
          ,
          <source>Journal of Algebra and Discrete Mathematics</source>
          ,
          <volume>1</volume>
          (
          <year>2005</year>
          )
          <fpage>51</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>R. W.</given-names>
            <surname>Carter</surname>
          </string-name>
          , Simple Groups of Lie Type, Wiley (
          <year>1972</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On Schubert cells of Projective Geometry and Quadratic Public Keys of Multivariate Cryptography, IACR e-print archive (</article-title>
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [34]
          <string-name>
            <surname>I. Gelfand</surname>
          </string-name>
          , R. MacPherson,
          <article-title>Geometry in Grassmanians and Generalization of the Dilogarithm, Adv</article-title>
          . in Math.
          <volume>44</volume>
          (
          <year>1982</year>
          )
          <fpage>279</fpage>
          -
          <lpage>312</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>I.</given-names>
            <surname>Gelfand</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Serganova</surname>
          </string-name>
          ,
          <source>Combinatorial Geometries and Torus Strata on Homogeneous Compact Manifolds, Soviet Math. Surv</source>
          .
          <volume>42</volume>
          (
          <year>1987</year>
          )
          <fpage>133</fpage>
          -
          <lpage>168</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <source>On Small World non Sunada Twins and Cellular Voronoi Diagams, Algebra and Discrete Mathematics</source>
          ,
          <volume>30</volume>
          (
          <issue>1</issue>
          ) (
          <year>2020</year>
          )
          <fpage>118</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>T.</given-names>
            <surname>Adamo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Ghiani</surname>
          </string-name>
          , E. Guerriero, On Path Ranking in Time-Dependent
          <string-name>
            <surname>Graphs</surname>
          </string-name>
          ,
          <source>Computers &amp; Operations Research</source>
          ,
          <volume>135</volume>
          (
          <year>2021</year>
          )
          <fpage>105</fpage>
          -
          <lpage>446</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>M.</given-names>
            <surname>Noether</surname>
          </string-name>
          , Luigi Cremona, Mathematische Annalen,
          <volume>59</volume>
          (
          <year>1904</year>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>V. L.</given-names>
            <surname>Popov</surname>
          </string-name>
          , Roots of the Affine Cremona group,
          <source>Contemporary Mathematics</source>
          ,
          <volume>369</volume>
          (
          <year>2005</year>
          )
          <fpage>12</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On Eulerian Semigroups of Multivariate Transformations and their Cryptographic applications</article-title>
          , European J. Math.
          <volume>9</volume>
          (
          <issue>93</issue>
          ) (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <source>On New Multivariate Cryptosystems based on Hidden Eulerian Equations, Dopovidi of National Academy of Science of Ukraine</source>
          ,
          <volume>5</volume>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On New Multivariate Cryptosystems based on Hidden Eulerian Equations over Finite Fields, IACR e-print archive (</article-title>
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wróblewska</surname>
          </string-name>
          , On Extremal Algebraic Graphs,
          <article-title>Quadratic Multivariate Public Keys and Temporal Rules</article-title>
          ,
          <source>FedCSIS</source>
          (
          <year>2023</year>
          )
          <fpage>1173</fpage>
          -
          <lpage>1178</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>