Jordan-Gauss graphs and quadratic public keys of Multivariate Cryptography Vasyl Ustimenko1,2,†, Oleksandr Pustovit2,∗,† 1 Royal Holloway University of London, United Kingdom, Egham Hill, Egham TW20 0EX, United Kingdom 2 Institute of telecommunications and global information space, NAS of Ukraine, Chokolivsky Boulevard 13, Kyiv, 02000, Ukraine Abstract Jordan-Gauss graphs are bipartite graphs given by special quadratic equations over the commutative ring K with unity with partition sets K n and K m such that the neighbour of each vertex is defined by the system of linear equation given in its row-echelon form. We use families of this graphs for the construction of new quadratic surjective multivariate maps F of affine spaces over K with the trapdoor accelerator T which is a piece of information which allows to compute the reimage of F in polynomial time. In particular for each quadratic automorphism F of K[x1, x2,..., xn] with the trapdoor accelerator T we construct the quadratic surjective map F’ of Kt, t=n 2+n onto K t-s, s≥0 with the trapdoor accelerator T’, T’>T. So we can introduce enveloping trapdoor accelerator for Matsumoto-Imai cryptosystem over finite fields of characteristic 2, for the Oil and Vinegar public keys over Fq or quadratic multivariate public keys defined over Jordan-Gauss graphs D(n, K),where K is arbitrary finite commutative ring with the nontrivial multiplicative group Keywords Multivariate Cryptography, Jordan – Gauss graphs, Projective Geometries, Largest Schubert Cells, Symbolic Computations 1 1. Introduction This paper presents the generalisations of the quadratic multivariate public key given in [23] and defined via special walks on projective geometries over finite fields and their natural analogues defined over general commutative rings. Multivariate cryptography is one of the five main directions of Post-Quantum Cryptography. The progress in the design of experimental quantum computers is speeding up lately. Expecting such development the National Institute of Standardisation Technologies of USA announced in 2017 the tender on standardisation best known quantum resistant algorithms of asymmetrical cryptography. The first round was finished in March 2019, essential part of 1 ITTAP’2024: 4th International Workshop on Information Technologies: Theoretical and Applied Problems, October 23- 25, 2024, Ternopil, Ukraine, Opole, Poland ∗ Corresponding author. † These authors contributed equally. Vasyl.Ustymenko@rhul.ac.uk (V. Ustimenko); sanyk_set@ukr.net (O. Pustovt) 0000-0002-2138-2357 (V. Ustimenko); 0000-0002-3232-1787 (O. Pustovit) Copyright © 2024 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings presented algorithms were rejected. In the same time the development of new algorithms with postquantum perspective was continued. Similar process took place during the 2, 3 and 4th rounds. The last algebraic public key «Unbalanced Oil and Vinegar on Rainbow like digital signatures» (ROUV) constructed in terms of Multivariate Cryptography was rejected in 2021 (see [2], [3]). The first 4 winners of this competition was announced in 2022, they are developed in terms of Lattice Theory. Noteworthy that NIST tender was designed for the selection and investigation of public key algorithms and in the area of Multivariate Cryptography only quadratic multivariate maps were investigated. We have to admit that general interest to various aspects of Multivariate Cryptography was connected with the search for secure and effective procedures of digital signature where mentioned above ROUV cryptosystem was taken as a serious candidate to make the shortest signature. Let us summarize the outcomes of mentioned above NIST tender. There are 5 categories that were considered by NIST in the PQC standardization (the submission date was 2017; in July 2022, the 4 winners and the 4 final candidates were proposed for the 4th round - this is the current official status. However, the current 8 final winners and candidates only belong to the following 4 different mathematical problems (not the 5 announced at the beginning):- lattice-based,- hash-based,- code-based, - supersingular elliptic curve isogeny based. The standards are partially published in 2024. Its interesting that new obfuscation ‘’TUOV: Triangular Unbalanced Oil and Vinegar’’ were presented to NIST (see https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/round-1/spec-files/TUOV- spec-web.pdf) by principal submitter Jintaj Ding. Further development of Classical Multivariate Cryptography which study quadratic and cubic endomorphisms of Fq[x1, x2,…, xn] is reflected in [14]. Current research in Postquantum Cryptography can be found in [4], [5], [6], [7], [8], [9], [10], [11], [12]. [13], [15], [16], [17], [27], [28], [29], [30] We use the concept of quadratic accelerator of the endomorphism σ of K[x1, x2,…, xn] which is the piece of information T such that its knowledge allows us to compute the reimage of (σ, Kn) in time O(n 2). Symbol K stands here for an arbitrary commutative ring with unity. Our suggestion is to use for public key the pairs (σ, T) such that σ has a polynomial density, i. e. number of monomial terms of σ(xi), i=1,2,…,n. Some examples of such public keys the reader can find in [1], [22] For each pair (K, n), n>1 we present quadratic automorphism σ of K[x1, x2,…, xn] with the trapdoor accelerator T defined via totality of special bipartite Jordan-Gauss graphs with the partition sets isomorphic to Kn. We discuss the possible use of these transformation in the case of finite fields and arithmetical rings Zq where q is a prime power. In this paper we suggest new quadratic multivariate public rules defined in terms of Projective Geometry. Recall that multivariate public rule G has to be given in its standard form xi →gi(x1, x2, … , xn), where polynomials gi are given via the lists of monomial terms in the lexicographical order. We consider the bipartite induced subgraphs J(F) of projective geometry over the field F which partition sets are the largest Schubert cells. The incidence of points and lines of these graphs is given by the system of quadratic equations such that the neighbourhood of each vertex is a solution set of the system of linear equation written in its row-echelon form. Straightforward change of the finite field F for the general commutative ring with unity gives the definition of cellular Schubert graph J(K) (see [23]). We use graphs J(K[x1, x2,…., xn])) for the construction of trapdoor accelerators, which are surjective multivariate maps F of Kn onto Kn’ written in their standard form together with the piece of information T such that the knowledge of this information allows to compute the reimage for the given value of F. The first cryptosystem based on such trapdoor accelerator where proposed in 2015 (see [31]), cryptanalysis for the system is still unknown. The obfuscations of these cryptosystems was suggested in [32]. They were seriously generalized in [23] where walks on general cellular Schubert graphs were used. In this article we suggest a wide class of generalization of previously proposed trapdoor accelerators based on Jordan-Gauss graphs. The main idea is to use algebraic temporal graphs. Such graphs are given via the system of algebraic equations which depends on the time of the computation. In the Section 2 we define cellular Schubert graphs. These Jordan-Gauss graphs will be used in the constructions of quadratic multivariate transformations of the affine spaces together with the corresponding trapdoor accelerators for the computation of reimages of these maps (se Section 4). Section 3 is dedicated to constructions of trapdoor accelerators for the polynomial maps defined in terms of temporal linguistic graphs, i. e. special sequences of linguistic graphs. In general case the degree of constructed maps can be essentially higher than 2. Section 5 presents some methods of constructions of new trapdoor accelerators in terms of known ones. In Section 6 we discuss the possible impact of proposed algorithms. 2. Schubert cellular graphs over the fields commutative ring The missing definitions of graph-theoretical concepts which appear in this paper can be found in [17], [18] or [19]. All graphs we consider are simple graphs, i.e. undirected without loops and multiple edges. Let V(G) and E(G) denote the set of vertexes and the set of edges of G respectively. When it is convenient, we shall identify G with the corresponding anti-reflexive binary relation on V(G), i.e. E(G) is a subset of V(G)∙V(G) and write v G u for the adjacent vertexes u and v (or neighbours). We refer to |{ x ϵ V(G)| xGv }| as degree of the vertex v. The incidence structure is the set V with partition sets P (points) and L (lines) and symmetric binary relation I such that the incidence of two elements implies that one of them is a point and another one is a line. We shall identify I with the simple graph of this incidence relation or bipartite graph. The pair x,y, xϵP, yϵL such that x I y is called a flag of incidence structure I. Projective geometry n-1PG(Fq) of dimension n-1 over the finite field Fq, where q is a prime power, is a totality of proper subspaces of the vector space V=(Fq) n of nonzero dimension. This is the incidence system with type function t(W)=dim(W), W ϵ n-1 PG(Fq) and incidence relation I defined by the condition W1IW2 if and only if one of these subspaces is embedded in another one. We can select standard base e1, e2,…, en of V and identify n-1PG(Fq) with the totality of linear codes in (Fq)n.The geometry n-1ℾ(q)= n-1PG(Fq) is a partition of subsets n-1ℾ(q) i consisting of elements of selected type i, i=1,2, …, n-1. We assume that each element of V is presented in the chosen base as column vector (x1, x1, … , xn). Let U stands for the unipotent subgroup of automorphism group PGLn(Fq) consisting of lower unitriangular matrices. 5 Let us consider orbits of the natural action of U on the projective geometry n-1PG(Fq). They are known as large Schubert cells. Each of orbits on the set ℾm(Fq) contains exactly one symplectic element spanned by elements ei(1), ei(2), ..., ei(m). So the number of orbits of (U, ℾm(Fq)) equals to binomial coefficient Cmn (n,m). Noteworthy that the cardinality of n-1 ℾm(Fq) is expressed by Gaussian binomial coefficient. Unipotent subgroup U is generated by elementary transvections xi,j(t), in and surjective map L’2 of affine space Km onto Km’, m≥m’ and get surjective map L’1 F L’2 of affine space Kn’ onto Km’. 1) Algorithm 2. Let us assume that s>r. We select the linguistic graph Im(K) of type (s, r, m) with symbolic scheme S and graphs 1Im(K) of type (r, s, m), 2Im(K) of type (s, r, m),..., graph 2tIm of type r, s, m with the symbolic schemes iS, i=1, 2,..., 2t. Similarly to algorithm 1 we consider the graphs Im(K[z1, z2, ..., zs+m]) together with j Im(K[z1, z2,..., zm+s]) , j ≥ 1 and select the polynomial tuples 0 H=(0h1(z1, z2,..., zs), 0h2(z1, z2, ..., zs), ..., 0hs(z1, z2, ..., zs)), 0 G=( 0g1(z1, z2, ..., zs), 0g2(z1, z2, ..., zs),..., 0gr(z1, z2, ..., zs)), 1 H=(1h1(z1, z2,..., zs), 1h2(z1, z2, ..., zs), ..., 1hr(z1, z2, ..., zs)), 1 G= ( 1g1(z1, z2, ..., zs), 1g2(z1, z2, ..., zs),..., 1gs(z1, z2, ..., zs)), 2 H=(2h1(z1, z2,..., zs),2h2(z1, z2, ..., zs), ..., 2hs(z1, z2, ..., zs)), 2 G= ( 2g1(z1, z2, ..., zs), 2g2(z1, z2, ..., zs),..., 2gr(z1, z2, ..., zs)), ..., 2t H=(2h1(z1, z2,..., zs),2h2(z1, z2, ..., zs), ..., 2hs(z1, z2, ..., zs)), 2t G= ( 2tg1(z1, z2, ..., zs), 2tg2(z1, z2, ..., zs),..., 2tgr(z1, z2, ..., zs)), H=H2t+1=(h1(z1, z2,..., zs), h2(z1, z2, ..., zs), ..., hr(z1, z2, ..., zs)). As in the algorithm 1 we take a special point (z1, z2 , ..., zs, zs+1, zs+2,..., zm+s)=(z) and compute 1 Jb(0) ((z)) = 0(z) in the graph Im(K[z1, z2, ..., zs+m]) with b(0)= 0H, Nc(0) (0(z))= 0([u]) in Im(K[z1, z2, ..., zs+m]) with c(0)= 0G, 1 Jb(1) (0([u]))=1([z]) in the graph 1Im(K[z1, z2,..., zm+s]) with b(1)= 1H, 1 Nc(1) (1([z]))= 1(u) in the graph 1Im(K[z1, z2,..., zm+s]) with c(1)= 1G, 1 Jb(2) ( 1(u))=2(z) in the graph 2Im(K[z1, z2,..., zm+s]) with b(2)= 2H, 2 Nc(2) ( (z))= (u) 2 2 in the graph 2Im(K[z1, z2,..., zm+s]) with c(2)2= 2G, ….. 1 Jb(2t) (2t-1([u]))=2t([z]) in the graph 2tIm(K[z1, z2,..., zm+s]) with b(2t)= 2tH, 1 Nc(2t) (2t([z]))= 2t(u) in the graph 2tIm(K[z1, z2,..., zm+s]) with c(2t)= 2tG. Finally we compute u as 2Jb (2t(u)) with b=H. Assume that u=(h1(z1, z2,..., zs), h2(z1, z2,...,zs),..., hr(z1, z2,...., zs), gs+1(z1, z2,..., zs, zs+1, zs+2,..., zs+m), gs+2(z1, z2,..., zs, zs+1, zs+2,..., zs+m), ..., gs+m(z1, z2,..., zs, zs+1, zs+2,..., zs+m)). We consider the polynomial map F of Ks+m to Kr+m itself given by the following rule (z1, z2,..., zs, zs+1, zs+2,..., zs+m)→(h1(z1, z2,..., zs), h2(z1, z2,..., zs),..., hs(z1, z2,...., zr), gs+1(z1, z2,..., zs, zs+1, zs+2,..., zs+m), gs+2(z1, z2,..., zs, zs+1, zs+2,..., zs+m), ..., gs+m(x1, x2,..., xs, xs+1, xs+2,..., x s+m). The transformation F is defined via the sequence of linguistic graphs of consecutively adjacent types Im(K)=0Im(K), 1Im(K), 2Im(K), ...,2tIm(K) and listed above sequences of tuples iH, i=0, 1, ..., 2t+1 and iG, i=0, 1, 2, ..., 2t with coordinates from K[z1, z2, ..., zs] of length s or r. Proposition 3 [22]. Let ( z1 , z2, …, zs)→( h1(z1, z2,..., zs), h2(z1, z2,..., zs),..., hr(z1, z2,...., zs) be a surjective map B from Ks onto Kr. Then transformation F=F(jIm(K), jG, iH), j=0, 1, …, 2m+1, i=0, 1, …, 2m+2 is a surjective map of Ks+m to Kr+m . Proposition 4 [22]. Let the conditions of the Proposition 1.1 holds and the polynomial map B has a trapdoor accelerator. Assume that L’1 and L’2 are surjective affine maps of affine space Kn’ onto Kn, n’>n and affine space Km onto Km’, m≥m’ respectively . Then polynomial surjective map L’1 F L’2 of affine space Kn’ onto Km’ also has a trapdoor accelerator. Below we present a modification of Algorithm 1. Let Im(K) be a linguistic graph of type (s, r, m). We define its digraph cover D(Im(K)) as the following directed graph. The set of vertexes of D(Im(K)) is subdivided into two blocks. 3The first one PLm(K) is the totality of ordered flags of kind ((p) , [l]) of the incidence structure Im(K) where (p)=(p1, p2,..., ps, ps+1,..., ps+2,..., ps+m), [l]=[l1, l2,..., lr, lr+1, lr+2,..., lr+m] such that (p)I[l] and the totality LPm (K) of ordered flags of kind [[l], p] and binary relation ψ which is defined via the conditions ((p), [l])ψ[[l’], (p’)] if [l]=[l’] and (p)≠(p’), [[l],(p)]ψ((p’), [l])) if (p)=(p’), [l] ≠[l’]. We refer to pair of tuples <(p1, p2,..., ps), [l1, l2, ..., lr]> of ((p), [l]) from PLm(K) as the colour of the flag. We say that (p1,p2,…,ps) and [l1,l2,…,ls] are internal and external colours of the flag ((p), [l]). The information on the flag can be given by the tuple (p1, p2, ..., ps, ps+1 , ps+2,..., ps+m, l1, l2, ..., lr). Dual presentation of ((p), [l]) is (p1, p2,…, ps, l1, lr+2,…, lr+m, l1, l2,…, lr)* given via the coordinates of line. Similarly we say that [l1, l2,...,lr] and (p1,p2,…,ps) are internal and external colours of [[l],(p)]. The information on this flag can be given by the tuple [l1,l2,..., lr, lr+1, lr+2,..., lr+m, p1, p2,..., ps] or dual presentation [l1,l2,..., lr, ps+1, ps+2,..., ps+m, p1, p2,..., ps]*. We introduce operator of change the colour 1JCa, a=(p’1, p’2,..., p’s, l’1, l’2,..., l’r) [(p), [l])]= (p1’, p’2, ..., p’s, ps+1, ps+2,..., ps+m, l’1, l’2,..., l’r) acting on PLm(K) and operator 2JCa , a=(l1’, l’2,...., l’r, p’1, p’2,..., p’s), 2JCa([[l],(p)]) [l’1, l’2,..., l’r, lr+1 ,lr+2, ..., lr+m, p’1, p’2 ,...p’s] acting on the set LPm(K). Algorithm 3. Alice takes the sequence of graphs D(Im(K)), D( lIm(K)), l=1,2,…,t. She will work with the multivariate ring K’=K[z1, z2,…, zs, zs+1, zs+2,…, zs+m, z1s+m+1, zs+m+2, …, zs+m+r ] and graphs D(Im(K’)),D( lIm (K’)). Alice selects the tuple 0H=(h1, h2,…, hs, g1, g2,…, gr) , H’=(h’1, h’2,…, h’s, g’1, g’2,…, g’r) and i H=(ih1, ih2,…, ihs, ig1, ig2,…, igr) from (K’)s+r . She takes the flag (z)=( z1, z2,…, zs, zs+1, zs+2,…, zs+m, zs+m+1, zs+m+2, …, zs+m+r ) of Im(K’). Assume that for ((p),[ l]) from j PL(Im(K’)), j=1.2,…,t-1 symbol ((p),[ l])* means ([l], (p)) from j+1PL(Im(K’)). If ((p),[ l]) is a flag from tPL(Im(K’)) then ((p),[ l])* is ([l], (p)) from t-1PL(Im(K’)). Alice uses operator 1Ja, a= 0H and computes 1z =1Ja(z)=( h1, h2,…, hs, z s+1, zs+2,…, zs+m, g1, g2,… gr) in the graph D(Im(K)). She computes (1u)=(1z)*= [ g1, g2,… gr, z’ s+1, z’s+2,…, zs’+m, h1, h2,…, hs] of the graph 1Im (K’) where [ g1, g2,… gr, z’ s+1, z’s+2,…, zs’+m] is the neighbour of ( h1, h2,…, hs, z s+1,) zs+2,…, zs+m) in Im(K’). 2Next Alice uses 1Ja(1), a(1)= 1H and computes 1Ja(1)(1u)= 2z in the graph 1Im (K’) and ( u)=( 2z)* from 2Im (K’). 2 She continue this procedure and constructs (iu), i=3.4,…, t. Alice takes (tu) from tIm (K’) and uses 2Jb, b= H’ for the computation of u=1J(tu) of kind ( h’1, h’2,…, h’s, v1, v2, …, vm, g’1, g’2,…, g’r) or (g’1, g’2,…, g’r, v1, v2, …, vm, h’1, h’2, …, h’s) dependently on t mod 2. She uses the following map G= G=G(jIm(K), iH, H’), i=0,1,…,t as the output of the algorithm. z1→h’1(z1, z2,…, zs, zs+m+1, zs+m+2, …, zs+m+r), z2→h’2(z1, z2,…, zs, zs+m+1, zs+m+2, …, zs+m+r), … zs→h’s(z1, z2,…, zs, zs+m+1, zs+m+2, …, zs+m+r), zs+1→v1(z1, z2,…, zs, zs+1, zs+2,…, zs+m, zs+m+1, zs+m+2, …, zs+m+r), zs+2→ v2(z1, z2,…, zs, zs+1, zs+2,…, zs+m, zs+m+1, zs+m+2, …, zs+m+r), …, zs+m→vm(z1, z2,…, zs, zs+1, zs+2,…, zs+m, zs+m+1, zs+m+2, …, zs+m+r), z1+s+m→g’1(z1, z2,…, zs zs+m+1, zs+m+2, …, zs+m+r), z2+s+m→g’2(z1, z2,…, zs, zs+m+1, zs+m+2, …, zs+m+r), … zr+s+m→g’r(z1, z2,…, zs,, zs+m+1, zs+m+2, …, zs+m+r). Proposition 5 [22]. Let z1 →h’1(z1, z2,..., zs zs+m+1, zs+m+2, …, zs+m+r), z2 → h’2(z1, z2,..., zs , zs+m+1, zs+m+2, …, zs+m+r),..., zs→ h’s,(z1, z2mzs, zs+m+1, zs+m+2, …, zs+m+r), z1+s+m→g’1(z1, z2,…, zs zs+m+1, zs+m+2, …, zs+m+r), z2+s+m→g’2(z1, z2,…, zs zs+m+1, zs+m+2, …, zs+m+r), …, ), zr+s+m→g’r(z1, z2,…, zs , zs+m+1, zs+m+2, …, zs+m+r) be a bijective map B from Ks+r onto Ks+r. Then transformation G=G(jIm(K), iH, H’), j=0, 1, …, t is a bijective map of Ks+r+m to itself. Proposition 6 [22]. Let the conditions of the Proposition 3 holds and the polynomial map B has a trapdoor accelerator. Then the standard form F of L1GL2 where L1 and L2 are affine transformations from AGLn(K), n=s+r+m has a trapdoor accelerator. The justification of this statement can be obtained via the modification of the procedure in the proof of Proposition 2. 4. On the examples of Schubert cellular graphs, their symplectic quotients and cryptographic algorithms Let us consider graphs m,m-1CS m+k-1(F) over the field F which are induced subgraphs of projective geometry PGm+k-1(F) with vertices from the largest Schubert cells on the totalities of m=dimensional and m-1 dimensional subspaces of the vector space Fm+k. They can be defined as totalities of points (x)=(x1, x2,…,xk, x1,1, x1,2,….,x k,m-1 ) and lines [y]=[y1, y2,…,ym-1, x1,1, x1,2,….,x k,m-1] from F k(m-1)+kand F k(m-1)+m-1 where indexes of coordinates of kind i,j for` i=1,2,…,k and j=1,2,…, m-1 are 1ordered lexicographically and the point (x) is incident to the line [y] if and only if the conditions for each pair i,j. Thesymbolic type S of this graph is the triple (k, m-1, k(m-1)) and the list of Li,j={xi yj} ordered lexicographically. Let K be commutative ring with the unity then graph m,m-1CS m+k-1(K) is defined via the change of F for K. Let Ik(m-1)(K) be the Jordan-Gauss graph over K symbolically equivalent to m,m-1CS m+k-1(K) then corresponding equations are ai,jxi,j- bijyi,j= ci,jxiyj where ai,j and bij are elements of multiplicative group K* and ci,j are elements from K-{0}. We can see that arbitrary nonempty subset M of {(11),(1,2),…, (m-1, m-1)} is define the symplectic quotient IM of Ik(m-1)(K). Other special case of cellular Schubert graph is m,1CSm(F) of type (m-1, m-1, 1) when we have points and lines of kind (x1, x2,…, xm) and [y1, y2, …., ym] and equation xm-ym=x1y1 +x2y2+… +xm-1ym-1. Symbolically equivalent to m,1CSm(F) will be Jordan-Gauss graph of type (m-1, m-1, 1) with the incidence given by an equation of kind axm-bym=c1x1y1 +c2x2y2+…+cm-1xm-1ym-1 with a and b from the multiplicative group K* and ci from K-{0}. Let us consider special homomorphisms of linguistic graphs and corresponding semigroups. Let I(K) be linguistic graph over commutative ring K defined in section and M = {m(1), m(2),…, m(d)} be a subset of {1, 2, …, m} (set of indexes for equations). Assume that equations indexed by elements from M of the following kind am(1)+s xm(1) -bm(1)ym(1)+r=fm(1)(x1, x2 , …, xs ,y1, y2, … , yr) am(2)xm(2)+s -bm(2)ym(2)+r= fm(2)(x1, x2, … ,xs,xm(1)+s,y1, y2, … , yr,, ym(1)+r) )… am(d)xm(d)+s -bm(d)ym(d)+r =fm(d) (x1, x2, … , xs,, ,xm(1)+s, xm(2)+s,… , xm (d-1)+s, y1, y2, … , yr,, ym(1)+r, ym(2)+r,,… , ym (d-1)+r) define other linguistic incidence structure IM.. Then the natural projections δ1,: (x)→(x1, x2, … , xs,, xm(1)+s, xm(2)+s,… , xm(d)+s) and δ2: [y]→[y1, y2, … , yr, ym(1)+r,ym(2)+r,… , y m(d)+r] of free modules define the natural homomorphism δ of incidence structure I onto I’=IM.. We will use the same symbol ρ for the colouring of linguistic graph IM.. It is clear, that δ is colour preserving homomorphism of incidence structures (bipartite graphs). We refer to δ as symplectic homomorphism and graph IM as symplectic quotient of linguistic graph I. In the case of linguistic graphs defined by infinite number of equations we may consider symplectic quotients defined by infinite subset M (see [22] where symplectic homomorphism was used for the cryptosystem construction). As it follows from the definition the symplectic quotient of Jordan-Gauss graph is also Jordan-Gauss graph. For each linguistic graph I and M={1, 2,…,d}, d1 as maximal degree of its coordinates as multivariate polynomials. Proposition 7 [22]. Let the condition of Proposition 1 holds, graph jIm(K), j=0,1, …, 2t +1 are symbolically equivalent to l,kCSn(K) or its dual graph and deg(jH)+deg(jG)≤2, j=1,2,…, 2t+1, deg(H)=2. Then transformation G=F(jIm(K)j, jG, iH), j=0, 1, …, 2t+1, i=0, 1, …, 2m+2 is a bijective quadratic map of Ks+m to itself. So under the conditions of Proposition 7 the construction of Proposition 2 is a bijective quadratic transformations with the trapdoor accelerator. Proposition 8 [22]. Let the condition of Proposition 3 holds, graph jIm(K), j=0,1, …, 2t are symbolically equivalent to l,kCSn(K) or its dual graph and deg(jH)+deg(jG)≤2, j=1,2,…, 2t, deg(H’)=2. Then transformation G=F(jIm(K), jG, iH), j=0, 1, …, 2t, i=0, 1, …, 2m+1 is a surjective quadratic map of Ks+m to Kr+m itself. So under the conditions of Proposition 8 the construction of Proposition 4 is a surjective quadratic transformations with the trapdoor accelerator. Proposition 9 [22]. Let the condition of Proposition 7 holds, graph jIm(K), j=0,1, …, t are symbolically equivalent to l,kCSn(K) or its dual graph and deg(jh1, jh2, ,,,, jhs)+deg( jg1, jg2, ,,,, jgr)≤2, j=0,1,2,…, t, and deg (H’)=2. Then the transformation G=G(jIm(K)j, iH, H’), j=0, 1, …, t is a bijective quadratic map of Ks+r+m to itself. So under the conditions of Proposition 9 the construction of Proposition 6 is a bijective quadratic transformations with the trapdoor accelerator. Remark. We can substitute graphs jIm(K) of the propositions 7, 8 and 9 for the nontrivial symplectic quotients of these Jordan-Gauss graphs. 5. On the extensions of known trapdoor accelerators Let us discuss Algorithm 1 in the case when the conditions of Proposition 2 and Proposition 7 hold. So graph jIm(K), j=0,1, …, 2t +1 are symbolically equivalent to l,kCSn(K) or its dual graph and deg(jH)+deg(jG)≤2, j=1,2,…, 2t+1, and deg(H)=2 and the transformation B has a trapdoor accelerator T. We suggest the following two options for the construction of the pair (B, T). 1.We take the triangular transformation Q:x1→a1x1+b1, x2→a2x2+f2(x1), x3→a3x3+f3(x1, x2),…, xs→ asxs+fs(x1, x2,…,xs-1) where ai, i=1, 2,…, s are elements from K* and deg fi=2, i=2,3,…,s together with two elements D1wn and D2 from AGLs(K) and define B as D1QD2. So the standard form of B and the decomposition of B into D1QD2 will be used as a trapdoor accelerator. 2. In [1] authors constructed multivariate quadratic cryptosystem based on Jordan-Gauss graphs D(s, K), s>4 of type (1, 1, s). Corresponding trapdoor accelerator is a standard form of automorphism of K[z1, z2,…, zs] and trapdoor accelerator which provides1 the knowledge on the graph D(s,K) and the tuple of ring elements of length O(n2). We may assume that the knowledge on the graph is publicly known. 3. We can use the procedure of Algorithm 1 under the conditions of Proposition 2 and Proposition 7 in the case of graph s,kCSs, kn=k+m and the affine space Km+r-1 onto Km’, m+r-1≥m’ respectively. Then she computes the standard form G of polynomial surjective map L’1 F L’2 of affine space Kn’ onto Km’ and sends it to Bob. Assume that Alice and Bob gets the hash value (c1, c2, …., cm’). Alice creates the intermediate tuple of variables u=(u1, u2,…ur-1, ur, ur+1, …, ur+m-1) and writes the system of linear equations L’2 (u)=c. So she gets the solution *u=(*u1, *u2,…, *ur-1 , *ur, *ur+1, …, *ur+m-1) and considers the quadratic equations B(z1, z2,..., zk)=*u =(*u1, *u2,…, *ur-1). The knowledge on the trapdoor accelerator of B allows Alice to get a solution z*=(*z1, *z2,…, *zk). So Alice computes 2tG= ( 2tg1(*z1, *z2, ..., *zk), 2tg2(*z1, *z2, ...,* zk),..., 2t gr-1(*z1, *z2, ..., *zk))=b(2t), 2t H=(2h1(*z1, *z2,..., *zk),2h2(*z1, *z2, ..., *zk), ..., 2hk(*z1, *z2, ..., *zk))=a(2t),…, 2 G= ( 2g1(*z1,* z2, ..., *zk), 2g2(*z1, *z2, ..., *zk),..., 2gr-1(*z1,*z2, ..., *zk))=b(2), 2 H=(2h1(*z1, *z2,..., *zk),2h2(*z1,* z2, ..., *zk), ..., 2hk(*z1,* z2, ...,* zk))=a(2), 1 G= ( 1g1(*z1, *z2, ..., *zk), 1g2(*z1,*z2, ..., *zk),..., 1gk(*z1,* z2, ..., *zk))=b(1), 1 H=(1h1(*z1, *z2,..., *zk), 1h2(*z1, *z2, ..., *zk), ..., 1hr-1(*z1, *z2, ..., *zk))=a(1), - 0 G=( 0g1(*z1, *z2, ..., *zk), 0g2(*z1, *z2, ..., *zk),..., 0gr-1(*z1, *z2, ..., *zk))=b(0), 0 H=(0h1(*z1, *z2,..., *zk), 0h2(*z1, *z2, ..., *zk), ..., 0hk(*z1, *z2, ..., *zk)))=a(0). Alice considers the graph 2tIm(K) with the line *u and computes 2Jb(2t)(*u)=u2t. She takes the point Na(2t)(u2t)=v2t. Alice treats v2t as the line of the graph 2t-1Im(K) and computes 2Jb(2t-1)=u2t-1. Alice forms the vertex Na(2t-1)=v2t-1 of graph 2t-1Im(K). She treats v2t-1 as vertex of 2t-2Im(K) and computes 2Jb(2t-2)=u2t-2. Alice takes the neighbour Na(2t-2)(u2t-2)=v2t-2. She continues this process. Alice takes the vertex v1 of the graph 1Im (K). She treat it as the line of the graph 0Im(K). Alice computes 2Jb(0)((v1)=u0. She computes Na(0)(u0)=v0 . Finally Alice computes v=1Jz*(v0). So she gets v=(v1, v2,…., vk, vk+1, vk+2,…,vk+m). Alice writes the system of linear equations L’1(y1, y2, …., yn’)=v and gets the solution *y= (*y1, *y2, …., *yn’). She sends *y to Bob. He checks that G(*y)=c. 6. Conclusion 6.1. Some remarks Below we present some heuristic arguments supporting the conjecture that the complexity to find the reimage of quadratic map of algorithms 1 and 2 without the knowledge of described trapdoor accelerator is nonpolynomial. Let us consider the case when Alice does not use endomorphisms L1 and L2 of degree 1. Assume that she use only one cellular Schubert graphs s,kCSm(K) with the operator of changing colour and the operator to compute the neighbour of chosen vertex. We can consider the graph ψ of the binary relation “ colours of vertexes x and y of different type can be changed to make recoloured vertexes adjacent in s,kCSm(K). Then input x and output y vertexes of algorithm 1 or 2 will be connected by the walk in ∙ψ. Dijkstra algorithm will allow us to find the walk between x and y and recover the reimage of y in time vln (v) where v is the order of graph. Let d , d>3 be the order of finite commutative ring K and n be the maximal dimension of the space of the partition sets of ψ. Then v>dn and the complexity of Dijkstra algorithm of finding the path between the input and the output of the algorithm is exponential one. We can expect that with the temporal graph defined via the sequence of Jordan-Gauss graphs j Im(K), j=0, 1, 2,… the complexity of finding the path will be higher. Temporal Jordan-Gauss graphs can be used for the constructions of new platforms of Noncommutative Cryptography (see [36], [37], [38], [39], [40], [41], [42] and new cryptanalytic results [43],[ 44], [45], [46], [47], [48], [49]). These platforms are special semigroups or groups of degree bounded by constant (2 or 3) of the Cremona semigroup of all endomorphisms of K[x1, x2,…, xn] over the selected K. Examples of such platforms can be found in [33], [22]. 6.2. The summary Multivariate Cryptography (MC) is one of the five core directions of Postquantum cryptography. It is specially important for creation of fast digital signatures procedures. Despite the fact currently announced by National Standards of Information Technology (NIST, USA) standards of postquantum cryptography are constructed in the terms of alternative to MC approaches the intensive research on new multivariate cryptosystem is continue. When it comes to digital signatures, NIST has developed two standards. The first is called Module- Lattice-Based Digital Signature Algorithm (ML-DSA for short) and defines a general digital signature algorithm. The second one is called Stateless Hash-Based Digital Signature Algorithm (SLH-DSA for short). It is a digital signature algorithm based on the hash technique. Essentially shorter signatures can be obtained with the multivariate cryptosystem ’’TUOV: Triangular Unbalanced Oil and Vinegar’’ algorithm were presented to NIST (see https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/round-1/spec-files/TUOV- spec-web.pdf) by principal submitter Jintaj Ding. Our paper presents several new multivariate digital signatures. Some of them are the generalisations of schemes [31] known since 2015 for which the cryptanalysis is still unknown. Proposed methods allow us to construct obfuscations of arbitrary selected multivariate cryptosystem such as mentioned above TUOV, old Matsumoto-Imai system, various variants of Oil and Vinegar system and others. Additionally new method gives an option to create algebraic cryptosystems over the finite commutative rings K different from finite fields such as arithmetical or Boolean rings. We believe that Multivariate K-theory for which the main instrument is an element of Cremona semigroup of endomorphisms of K[x1, x2,…, xn] (see [25], [26]) has a capacity to provide efficient digital signatures. Suggested algorithms in case of finite fields and arithmetical rings can be already used for the protection of Information systems. Acknowledgements This research is supported by British Academy Fellowship for Researchers under Risk 2022 and by British Academy and partially supported by the British Academy award LTRSF\100333. References [1] Vasyl Ustimenko, Aneta Wróblewska, On extremal algebraic graphs, quadratic multivariate public keys and temporal rules, FedCSIS 2023: 1173-1178 (see also IACR,e-print archive 2023/738). [2] Ward Beullens, Improved Cryptanalysis of UOV and Rainbow, In Eurocrypt 2021, Part 1, pp. 348-373. [3] Anne Canteaut, François-Xavier Standaert (Eds.), Eurocrypt 2021, LNCS 12696, 40th Annual In-ternational Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I, Springer. [4] Ding and A. Petzoldt, "Current State of Multivariate Cryptography," in IEEE Security & Privacy, vol. 15, no. 4, pp. 28-36, 2017, doi: 10.1109/MSP.2017.3151328. [5] Smith-Tone, D. (2022), 2F - A New Method for Constructing Efficient Multivariate Encryption Schemes, Proceedings of PQCrypto 2022: The Thirteenth International Conference on Post-Quantum Cryptography, virtual, DC, US. [6] Daniel Smith Tone, New Practical Multivariate Signatures from a Nonlinear Modifier, IACR e-print archive, 2021/419. [7] Daniel Smith-Tone and Cristina Tone, A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code, https://eprint.iacr.org/2019/1355.pdf [8] Jayashree, Dey, Ratna Dutta, Progress in Multivariate Cryptography: Systematic Review, Challenges, and Research Directions, ACM Computing Survey, volume 55, issue 12,No.246, pp 1-34, https://doi.org/10.1145/3571071. [9] Cabarcas Felipe, Cabarcas Daniel, and Baena John. 2019. Efficient public-key operation in multivariate schemes. Advances in Mathematics of Communications 13, 2 (2019), 343. [10] Cartor Ryann and Smith-Tone Daniel. 2018. EFLASH: A new multivariate encryption scheme. In Proceedings of the International Conference on Selected Areas in Cryptography. Springer, 281–299. [11] Casanova Antoine, Faugère Jean-Charles, Macario-Rat Gilles, Patarin Jacques, Perret Ludovic, and Ryckeghem Jocelyn. 2017. Gemss: A great multivariate short signature. Submission to NIST (2017).y. Springer, Singapore, 209–229. [12] Chen Jiahui, Ning Jianting, Ling Jie, Lau Terry Shue Chien, and Wang Yacheng. 2020. A new encryption scheme for multivariate quadratic systems. Theoretical Computer Science 809 (2020), 372–383. [13] Chen Ming-Shing, Hülsing Andreas, Rijneveld Joost, Samardjiska Simona, and Schwabe Peter. 2018. SOFIA: MQ-based signatures in the QROM. In Proceedings of the IACR Inter- national Workshop on Public Key Cryptography. Springer, 3–33. [14] Ding Jintai, Petzoldt Albrecht, and Schmidt Dieter S.. 2020. Multivariate Public Key Cryp- tosystems, Second Edition. Advances in Information Security. Springer. [15] Dung H. Duong, Ha T. N. Tran, Willy Susilo, and Le Van Luyen. 2021. An efficient multivariate threshold ring signature scheme. Computer Standards & Interfaces 74. [16] Jean-Charles Faugère, Gilles Macario-Rat, Jacques Patarin, and Ludovic Perret. 2022. A new perturbation for multivariate public key schemes such as HFE and UOV. Cryptology ePrint Archive (2022). [17] N. Biggs, Algebraic graphs theory, Second Edition, Cambridge University Press, 1993. [18] A. Brower, A. Cohen, A. Nuemaier, Distance regular graphs, Springer, Berlin, 1989. [19] B. Bollob´as, Extremal Graph Theory, Academic Press, London, 1978 [20] V. Ustimenko, Maximality of affine group, hidden graph cryptosystem and graph's stream ciphers, Journal of Algebra and Discrete Mathematics, 2005, v.1, pp 51-65 [21] V. Ustimenko, On small world non Sunada twins and cellular Voronoi diagams, Algebra and Discrete Mathematics, vol. 30, N1 (2020), pp. 118-142. [22] V. Ustimenko. 2022. Graphs in terms of Algebraic Geometry, symbolic computations and secure communications in Post-Quantum world, UMCS Editorial House, Lublin, 2022, 198. [23] V. Ustimenko, 2023, Schubert cells and quadratic public keys of Multivariate Cryptography. CEUR Workshop Proceedings ITTAP , https://ceur-ws.org/Vol-3628/. [24] N. Bourbaki, Lie Groups and Lie Algebras, Chapters 1 - 9, Springer, 1998-2008. [25] M. Noether,{\em Luigi Cremona}, Mathematische Annalen, 59 (1904), pp. 1-19. [26] V. L. Popov, Roots of the affine Cremona group, in: Affine Algebraic Geometry, Seville, Spain, June 1821, 2003, Contemporary Mathematics, Vol. 369, American Mathematical Society, Providence, RI, 2005, pp. 12-13. [27] Markku Juhani Saarinen, Daniel Tony Smith (editors), Post Quantum Cryptography, 15th International Workshop, PQCrypto 2024,Oxford, UK, June 12-14, 2024, Proceedings, Part 1. [28] Markku Juhani Saarinen, Daniel Tony Smith (editors), Post Quantum Cryptography, 15th International Workshop, PQCrypto 2024,Oxford, UK, June 12-14, 2024, Proceedings, Part 2. [29] Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu (editors), International Symposium on Mathematics, Quantum Theory, and Cryptography, Proceedings of MQC 2019, Open Access, 2021 [30] Kohei Arai (editor), Advances in Information and Communication,Proceedings of the 2024 Future of Information and Communication Conference (FICC), Volume 1-3, Lecture Notes in Networks and Systems, (LNNS, volume 919 -921) , Springer, 2024. [31] V. Ustimenko, On Schubert cells in Grassmanians and new algorithms of multivariate cryptography, Proceedings of the Institite of Mathematics, Minsk, 2015, Volume 23, N 2, pp. 137-148 (Proceedings of international conference “Discrete Mathematics, algebra and their applications”, Minsk, Belarus, September 14-18, 2015, dedicated to the 100th anniversary of Dmitrii Alexeevich Suprunenko). [32] V. Ustimenko, Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography, IACR e-print archive, 2023/175. [33] v. ustimenko, On computations with double Schubert automaton and stable maps of multivariate cryptography, Interdisciplinary Studies of Complex SystemsNo. 19 (2021) 18– 32. [34] I. Gelfand, R. MacPherson,Geometry in Grassmanians and generalisation of the dilogarithm, Adv. in Math., 44 (1982), 279-312. [35] I. Gelfand, V. Serganova, Combinatorial geometries and torus strata on homogeneous compact manifolds, Soviet Math. Surv. 42 (1987), 133-168. [36] D. N. Moldovyan and N.A. Moldovyan, A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010: Computer Network Security pp 183-194. [37] L. Sakalauskas, P. Tvarijonas and A. Raulynaitis, Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problem in Group Representation Level, INFORMATICA, 2007, vol. 18, No 1, 115-124. [38] V. Shpilrain, A. Ushakov, The conjugacy search problem in public key cryptography: unnecessary and insufficient, Applicable Algebra in Engineering, Communication and Computing, August 2006, Volume 17, Issue 3–4, pp 285–289. [39] Delaram Kahrobaei and Bilal Khan, A non-commutative generalization of ElGamal key exchange using polycyclic groups, In IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference [4150920] DOI: 10.1109/GLOCOM.2006. [40] Alexei Myasnikov; Vladimir Shpilrain and Alexander Ushakov (2008), Group-based Cryptography, Berlin: Birkhäuser Verlag. [41] Zhenfu Cao (2012), New Directions of Modern Cryptography. Boca Raton: CRC Press, Taylor & Francis Group. ISBN 978-1-4665-0140-9. [42] Benjamin Fine, et. al. "Aspects of Non abelian Group Based Cryptography: A Survey and Open Problems", arXiv:1103.4093. [43] V. A. Roman'kov, A nonlinear decomposition attack, Groups Complex. Cryptol. 8, No. 2 (2016), 197-207.27. [44] V. Roman'kov, An improved version of the AAG cryptographic protocol, Groups, Complex., Cryptol, 11, No. 1 (2019), 35-42. [45] A. Ben-Zvi, A. Kalka and B. Tsaban, Cryptanalysis via algebraic span, In: Shacham H. and Boldyreva A. (eds.) Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I, Vol. 10991, 255{274, Springer, Cham (2018). [46] B. Tsaban, Polynomial-time solutions of computational problems in noncommutative- algebraic cryptography, J. Cryptol. 28, No. 3 (2015), 601-622. [47] V. Roman’kov, Cryptanalysis of a new version of the MOR scheme, arXiv:1911.00895 [cs.CR]. [48] V. Roman’kov, Cryptanalysis of two schemes of Baba et al. by linear algebra methods. CoRR abs/1910.09480 (2019). [49] Adi Ben-Zvi, Arkadius G. Kalka, Boaz Tsaban, Cryptanalysis via Algebraic Spans. CRYPTO (1) 2018: 255-274