<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On Symbolic Computations over Arbitrary Commutative Rings via Temporal Jordan-Gauss Graphs and Multivariate Cryptosystems⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Ustimenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Pustovit</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Telecommunications and Global Information Space, NAS of Ukraine</institution>
          ,
          <addr-line>13 Chokolivsky ave., 02000 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Royal Holloway University of London, United Kingdom</institution>
          ,
          <addr-line>Egham Hill, Egham TW20 0EX</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
      </contrib-group>
      <fpage>405</fpage>
      <lpage>424</lpage>
      <abstract>
        <p>The paper is dedicated to Multivariate Cryptography over general commutative ring K and protocols of symbolic computations for safe delivery of multivariate maps. We consider the iterative algorithm of generation of multivariate maps of prescribed degree or density with the trapdoor accelerator, i.e. piece of information which allows to compute the reimage of the map in polynomial time. The concept of JordanGauss temporal graphs is used for the obfuscation of known graph based public keys and constructions of new cryptosystems. We suggest use of the platforms of Noncommutative Cryptography defined in terms of Multivariate Cryptography over K for the conversion of Multivariate Public Keys into El Gamal type Cryptosystems. Some new platforms are introduced.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;public key</kwd>
        <kwd>multivariate cryptography</kwd>
        <kwd>general commutative ring</kwd>
        <kwd>noncommutative cryptography</kwd>
        <kwd>key exchange protocols</kwd>
        <kwd>semigroups of transformations</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>K[x1, x2, ..., xn] which sends each variable xi, i = 1, 2, ..., n to a monomial term. Some other protocols
of Noncommutative Cryptography with the platform nES(K) are given in [1].</p>
      <p>
        For each positive integer d, d≥2 we present the multivariate map of degree d with the trapdoor
accelerator. In fact we present the iterative process of expansion of initial map F0 which can be a
bijective multivariate nonlinear map of degree at most d on Kn with the trapdoor accelerator T or
an element of general affine group AGLn(K). The input parameters are positive integers m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ),
m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., m(k), k≥2. The step i, i = 1, 2, ..., k of the algorithm produces the multivariate map Gi of
degree d on the Kn+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+...+m(i) with the trapdoor accelerator Ti.
      </p>
      <p>
        Similarly we can take polynomial surjective map F0 of Kn onto Kr of degree at most d with the
trapdoor accelerator T and get the sequence of surjective polynomial multivariate maps of
Kn+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+...+m(i) onto Kr+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+...+m(i) of degree d with the trapdoor accelerators.
      </p>
      <p>So we can use known construction of multivariate cryptography over the general maps with
trapdoor accelerators or linear maps on affine spaces for the construction of new maps together
with the polynomial algorithm to compute reimage.</p>
      <p>We define the density of the multivariate polynomial in n variables as the number of its
monomial terms. The density of multivariate map F: (x1, x2, ..., xn) → (f1(x1, x2, ..., xn), f2(x1, x2, ...,
xn), ..., f2(x1, x2, ..., xn), ..., fm(x1, x2, ..., xn)) is the maximal value of densities of fi for i = 1, 2, ..., m.</p>
      <p>We also will work with the multivariate maps in n variable of unbounded degree and prescribed
density O(nλ). Let K* stands for the multiplicative group of K. Assume that K* is nontrivial. We say
that multivariate map F of Kn to itself has multiplicative trapdoor accelerator T if the restriction of F
onto (K*)n is injective map and the knowledge of T allows to compute the reimage of the element
from F((K*)n) in a polynomial time.</p>
      <p>
        For each nonnegative rational number λ we present the explicit constructions of multivariate
maps of density λ with unbounded degree and multiplicative trapdoor accelerator. Additionally we
present the iterative process of the expansion of the selected initial map F0 which is a multivariate
nonlinear map of density O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) on Kn with unbounded degree and the multiplicative trapdoor
accelerator T. The input consists of positive integers m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., m(k), k≥2 and some internal
parameters which are nonnegative rational numbers.
      </p>
      <p>
        The step i, i = 1, 2, ..., k of the algorithm produces the multivariate map Gi of polynomial density
on the Kn+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+...+m(i) with the multiplicative trapdoor accelerator Ti. Appropriate choice of internal
parameters allows us to construct Gk of prescribed density O((n+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+...+m(k))λ).
      </p>
      <p>We can use multivariate maps of unbounded degree and prescribed polynomial density with the
multiplicative trapdoor accelerator instead of maps of bounded degree in the presented above
scheme of access control. We can use the same protocol of Noncommutative Cryptography and the
same platform nES(K) of Eulerian transformations. The modification of the deformation rule will be
presented.</p>
      <p>
        Let us consider the case of finite commutative ring K of the cardinality O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) with nontrivial
multiplicative group. In the case of the map F of unbounded by constant degree of size O(n) and of
density O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) with the multiplicative trapdoor accelerator we use term pseudolinear map. The
complexity of computation of F(p), pϵ(K*)n is O(n2). In the case of density O(nλ), λ&lt;1 we use the term
of sub quadratic map. The complexity of computation of F(p), pϵ (K*)n is O(n2+λ).
      </p>
      <p>It is better then in the case of quadratic map on the space Kn. If density is O(n) we say that we
have pseudo quadratic map.</p>
      <p>We hope that defined in the paper wide variety of the quadratic or cubic maps with the
trapdoor accelerators and the varieties of pseudo-linear, sub quadratic and pseudo quadratic maps
with the multiplicative trapdoor accelerators can be effectively used in the presented above scheme
of the access control of Information System.</p>
      <p>These varieties are defined via the symbolic computations in terms of algebraic graphs defined
by the systems of nonlinear algebraic equations over the finite commutative ring K with unity or
temporal analogue of these graphs for which generic equations are changeable with the change of
time. The sequences of pseudorandom or genuinely random graphs can be used for the change of
coefficients in time dependent algebraic equations.</p>
      <p>For the design of maps we use Jordan-Gauss graphs which are bipartite graph with partition
sets Kn and Km given via quadratic equations such that the neighbourhood of the vertex is the
solution set of linear system of equations written in its row-echelon form.</p>
      <p>Subsection 2.1 of Section 2 contains basic definitions of affine Cremona semigroup and group of
endomorphism of multivariate ring K[x1, x2, ..., xn], endomorphisms with the trapdoor accelerators.
It contains the discussion of the area of Multivariate Cryptography over the general finite
commutative ring.</p>
      <p>In the subsection 2. 2 we define linguistic graphs over the general commutative ring and their
temporal analogue. Algorithm 1.2 allows us to construct the variety of elements of Cremona
semigroup with the trapdoor accelerator defined in terms of selected linguistic graph or its
temporal analogue. Simple conditions insure that the constructive map is bijective transformation
of Kn. The method allows us to construct surjective maps of Kn onto Km, n&gt;m≥2 with the trapdoor
accelerator. For practical implementation of the algorithm we need select special classes of
linguistic graphs which allow us to control the degrees and densities of the outputs. We define the
special class of Jordan-Gauss graphs and consider flexible families of generalised Double Schubert
graphs DSs,r(K) and truncated Double Schubert graphs QDSs,r(K) which are convenient instruments for
generating of families of multivariate maps of prescribed degree on the affine space Kn.</p>
      <p>Assume that (F, T) stands for pair multivariate function F of degree d, d≥2 on K n and its trapdoor
accelerator. We suggest the method of construction of new pair (F’, T’) of degree d on Kn’, n’&gt;n from
the known (F, T). It can be used iteratively. Many constructions of pairs (F, T) over fields can be
found in the recent papers on Classical Multivariate Cryptography [2–13].</p>
      <p>In Section 3 we introduce semigroup of nES(K) of Eulerian endomorphisms of K[x1, x2, ..., xn] and
consider iterative method of construction of multivariate maps of prescribed density O(nd) with the
trapdoor accelerators or multiplicative trapdoor accelerators. These maps are constructed in terms
of temporal truncated Schubert graphs.</p>
      <p>In Section 4 we consider twisted Diffie-Hellman protocol implemented with the platform nES(K)
of Eulerian transformations. We introduce several deformation rules convenient for the safe
delivery of multivariate maps of prescribed degree or density from one correspondent to his/her
partner. We discuss the use of stable subsemigroups of Cremona semigroup nCS(K) as a platform
for the protocol. Stability means that the maximal degree of endomorphisms from the semigroup is
a constant d.</p>
      <p>Section 5 contains conclusive remarks. We have to note that last talk at Eurocrypt conferences
was delivered in 2021. It is paper [14] dedicated to cryptanalytic studies. Some studies on
Multivariate Cryptography were presented during PQCrypt workshops [15–18].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of the last research and publications</title>
      <sec id="sec-2-1">
        <title>2.1. General remarks</title>
        <p>Let K be a finite commutative ring. It is possible to say that Multivariate Cryptography in a wide
sense is about the use of polynomial maps F of affine spaces Kn to itself for cryptographical
purposes.</p>
        <p>In classical case K=Fq the map F is an element of affine Cremona semigroup nCS(K) of
endomorphisms of multivariate ring K[x1, x2, ..., xn]. Endomorphism F can be given by its values
F(x1) = f1, F(x2)=f2, ..., F(xn)=fn on the variables xi, i = 1, 2,..., n.</p>
        <p>We can assume that polynomials fi are given in their standard form i.e. sum of monomial terms
ordered in lexicographical order.</p>
        <p>Endomorphism F induces the map F’: x1 → f1(x1, x2, ..., xn), x2 → f1(x1, x2, ..., xn), ..., xn → fn(x1, x2, ...,
xn) of the affine space Kn into itself.</p>
        <p>We define degree deg(F) as maximal value of deg (fi). The density den fi(x1, x2, ..., xn) is its number of
monomial terms. We define density den(F) of F as maximal value of den (fi), i = 1, 2, ..., n and
identify endomorphism F with the tuple (f1(x1, x2, ..., xn), f2(x1, x2, ..., xn), ..., fm(x1, x2, ..., xn)).</p>
        <p>The image Im F’ is isomorphic to Km for some m, n≥m. We can treat F’ as surjective map of Kn
onto Km.</p>
        <p>We say that piece of information T is trapdoor accelerator of surjective nonlinear polynomial
map F’ of K n onto Km, n≥m if the knowledge of T allows to compute a reimage of given element
bϵKm in a polynomial time.</p>
        <p>New multivariate cryptosystem “TUOV: Triangular Unbalanced Oil and Vinegar” was officially
submitted to NIST recently see https://csrc.nist.gov/csrc/media/Projects/pqc-digsig/documents
/round-1/spec-files/TUOV-spec-web.pdf). It is based on the quadratic map defined over finite fields
with the trapdoor accelerator.</p>
        <p>He hopes that this is the example of one way function, i.e. the reimage of this quadratic map is
not possible to compute in a polynomial time without the knowledge of given trapdoor accelerator.</p>
        <p>As you know the existence of one way function is not proven. Anyway there is a chance of
NIST certification of TOUV as first representative from the class of Multivariate Public Keys.</p>
        <p>As you know Multivariate cryptography uses the gap between linearity and nonlinearity. We
know that the system of linear equations written over the field F can be solved in time O(n3) via
Jordan-Gauss elimination method.</p>
        <p>The complexity of solving a nonlinear system of constant degree d, d&gt;1 is subexponential.</p>
        <p>Despite the convenience of Groebner basis method for the implementation the complexity of
this algorithm is equivalent to old Gauss elimination method for solution of the system of
nonlinear equation.</p>
        <p>Recall that the standard way to transform of nonlinear system of equation of degree d, d&gt;2 to an
equivalent quadratic system via introduction of additional variables and substitutions is well
known [19].</p>
        <p>So if we have a nonlinear map F of bounded degree d in “general position” which has a trapdoor
accelerator T then corresponding cryptosystem is secure. This status is insure the fact that F is
given as one way function i.e. reimage of F is impossible to compute in a polynomial time without
knowledge of the secret T.</p>
        <p>The map F is not in “general position” if some additional specific information is known. For
instance, if F is bijective cubic map and F-1 is also cubic. Then public user can generate O(n3) pairs of
kind plaintext p/corresponding ciphertext c and approximate inverse map in time O(n10).</p>
        <p>Known computer tests and cryptanalytic methods are attempts to justify that map F is “in
general position”. Noteworthy that the existence of one way function is not proven yet even under
the main complexity conjecture that P≠NP.</p>
        <p>Note that the investigation of nonlinear systems of equations over the commutative ring K with
zero divisors is essentially harder case in comparison the case of a field.</p>
        <p>Multivariate Cryptography over rings with zero divisors can be an interesting direction of
cryptographic research.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Linguistic graphs and multivariate maps over commutative rings</title>
        <p>Below we present the method of construction of nonlinear representatives of affine Cremona
semigroup End K[x1, x2,..., xn] where K is a finite commutative ring.</p>
        <p>
          The incidence structure is the set V with the partition sets P (points) and L (lines) and symmetric
binary relation I such that the incidence of two elements implies that one of them is a point and
another one is a line. We shall identify I with the simple graph of this incidence relation which is of
course a bipartite graph. The pair x, y, x ϵ P, yϵ L such that x I y is called a flag of incidence
structure I.
Let K be a finite commutative ring with the unity. We refer to an incidence structure with a point
set P = Ps,m = Ks+m and a line set L = Lr,m = Kr+m as linguistic incidence structure Im if point x = (x1, x2,
…, xs, xs+1, xs+2, …, xs+m) is incident to line y = [y1, y2, …, yr, yr+1,yr+2, …, yr+s] if and only if the following
relations hold
a1xs+1-b1yr+1 = f1(x1, x2, …, xs, y1, y2, …, yr),
a2xs+2-b2yr+2 = f2(x1, x2, …, xs, xs+1, xs+1, y1, y2, …, yr, yr+1),
…
amxs+m-bmyr+m = fm(x1,x2,… ,xs, xs+1, …, xs+m-1, y1, y2, …, yr, yr+1, …,yr+m-1)
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
where aj, and bj, j = 1, 2, …, m are not zero divisors, and fj are multivariate polynomials with
coefficients from K [20, 21]. Brackets and parenthesis allow us to distinguish points from lines.
        </p>
        <p>The colour ρ(x) = ρ((x)) (ρ(y) = ρ([y])) of point (x) (line [y]) is defined as projection of an element
(x) (respectively [y]) from a free module on its initial s (relatively r) coordinates. As it follows from
the definition of linguistic incidence structure for each vertex of the incidence graph there exists a
unique neighbour of a chosen colour.</p>
        <p>We refer to ρ((x)) = (x1, x2, …, xs) for (x) = (x1, x2, …, xs+m) and ρ([y]) = (y1, y2, …, yr) for [y] = [y1, y2,
…, yr+m] as the colour of the point and the colour of the line respectively. For each bϵKr and p = (p1,
p2, …,ps+m) there is a unique neighbour of the point [l] = Nb(p) with the colour b. Similarly for each
cϵKs and line l = [l1, l2, …, lr+m] there is a unique neighbour of the line (p) = Nc([l]) with the colour c.
The triples of parameters s, r, m defines type of linguistic graph.</p>
        <p>Let Ja(v) stands for the operator of change colour of vertex v (point or line) for a = (a1, a2, ..., at)
where t=s or t=r.</p>
        <p>We consider also linguistic incidence structures defined by infinite number of equations. Let
I(K) and I’(K’) be two linguistic graphs of the same type (s, r, m) with governing polynomials fi and
f’i written in their standard forms. We refer to them as symbolically equivalent structures if
monomial terms of fi and f’i for each i are the same up to their nonzero coefficients.</p>
        <p>We refer to family I(K)t, t = 1, 2, ... of symbolically equivalent linguistic graphs as temporal
linguistic graph.</p>
        <p>
          Algorithm 1.2. (Generation of multivariate map F with the trapdoor accelerator [22])
Let us consider linguistic graph mIs,r(K) given by equations (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) of type s, r, m, s ≥r together with
graph mIs,r(R) where R is the commutative ring of multivariate polynomials K[z1, z2, ..., zs, zs+1, zs+2, ...,
zs+m] given by the same equations (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) with coefficients from K but with variables xi, yj from R. So
infinite graph mIs,r(R) has the point set Rs+m and the line set Rr+m.
        </p>
        <p>
          Let us conduct the following symbolic computation. We consider the special point z = (z) = (z1,
z2, ..., zs, zs+1, zs+2, ..., zs+m) which coordinates are variables, positive integer l and colours a(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), a(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ...,
a(l), b(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), b(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., b(l) and c such that a(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), a(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ), ..., a(l), b(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), b(
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), ..., b(l-1) ϵ K[z1, z2, ..., zs]s, elements
a(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), a(
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), ..., a(l-1), b(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), b(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ), ..., b(l)ϵK[z1, z2, ..., xs]r.
        </p>
        <p>
          So, we compute recurrently v1 = Ja(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )(z), u1 = Nb(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )(v1), v2 = Ja(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )(u1), u2 = Nb(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )(v2), ..., vl = Ja(l)(ul-1),
ul = Nb(l)(vl) and finally Jc(ul) = v. If l is odd then v = (f1, f2, ..., fr, f1+r, f2+r, ..., fm+r). Thus we construct the
map F = F(a(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), a(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., a(l), b(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), b(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., b(l), c) from Ks+m to Kr+m sending the tuple (z1, z2, ..., zs, xs+1,
xs+2, ..., xs+m) to (f1, f2, ..., fr, fr+1, fr+2, ..., fr+m). In the case of even k we construct the transformation
F = F(a(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), a(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., a(l), b(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), b(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., b(l), c) of Ks+m given by the tuple (f1, f2, ..., fs, f1+s, f2+s, ..., fm+s).
        </p>
        <p>Note that fi, i = 1, 2, ..., s are elements of K[z1, z2, ..., zs] but fiϵK[z1, z2, ..., zs, z1+s, z2+s, ..., zm+s].</p>
        <p>Assume that map L1 is an element of AGLs+m(K) and L2 is taken from AGLr+m(K) in the case of odd
l and L2 ϵAGLs+m(K) if l is even. The bijective polynomial maps L1 and L2 have degree 1. Then we can
compute the standard form of the map G=L1FL2.</p>
        <p>
          Proposition 1. 2. [22] Assume that constant l is odd the tuple c defines surjective multivariate
map C from Ks to K r with trapdoor accelerator T and parameters a(i), b(i) and c have degrees of size
O(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ). Then polynomial surjective map G from Ks+m to Kr+m has the trapdoor accelerator T’ which is the
knowledge on l, a(i), b(i), i = 1, 2, ..., l, C, T, L1, L2 and equations (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ).
        </p>
        <p>Remark 1.2. If K = Fq we can take the pair C, T defined by J. Ding and his team and get a new
surjective map G from larger vector space with the trapdoor accelerator.</p>
        <p>
          Proposition 2.2. [22] Assume that l is even or r = s and the tuple c defines bijective multivariate map
C from Ks to Ks with trapdoor accelerator T. Assume that a(i), b(i), c are of size O(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ). Then the map G is
bijective, it has trapdoor accelerator T’ which is the knowledge on l, a(i), b(i), i =1, 2, ..., l, C, T, L1, L2
and equations (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ).
        </p>
        <p>Remark 2.2. Under the condition of Proposition 2 in the case of even l it could be that r&gt;s.
Procedure 1.2 (reimage computation).</p>
        <p>Alice gets the image e = (e1, e2, ..., et, et+1, et+2, ..., et+m), t = r or t = s of the map G. She creates
intermediate vector (z1, z2, .., zs, zs+1, zs+2, ..., zs+m). Alice computes (L2)-1(e) = (d1, d2, ..., dt, dt+1, dt+2, ...,
ds+m) = d. She investigates the system of equations c1(z1, z2, ..., zs) = d1, c2(z1, z2, ..., zs) = d2, …, ct(z1,
z2, ..., zs) = dt. The knowledge of T allows her to take some solution z1 = α1, z2 = α2, ..., zs = αs. Alice
calculates values β(i) = b(i)(α1, α2, ..., αs), γ(i) = a(i)(α1, α2, ..., αs), i = 1, 2, ..., l.</p>
        <p>
          She computes Jβ(l)(d) = vl, Na(l)(vl) = ul, Jβ(l-1)(ul) = vl-1, Na(l-1)(vl-1) = ul-1, …, Jβ(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )(u2) = v1, Na(l)(v1) = u1,
Ja(u1) = u for a = (α1, α2, ..., αs).
        </p>
        <p>Alice computes the reimage as (L1)-1(u).</p>
        <p>
          Remark. 3.2. We can define F = F(a(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), a(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., a(l), b(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), b(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., b(l), c) = F(a(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), a(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., a(l),
b(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), b(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., b(l), c, I1, I2, ..., Il) in the case of temporal linguistic graph mIs,r(K)t via simple assumption
that operators Nb(j) of the algorithm are executed in the graph Ij (K[z1, z2, ..., zs, zs+1, zs+2, ..., zs+m])
formed as expansion of momentum graph Ij = mIs,r(K)j/t = j, j = 1, 2, ..., l. Proposition 1.1 and 2.2 hold
for temporal graphs as well.
        </p>
        <p>To control the degrees and densities of F = F(a1, a2, ..., al, b1, b2, ..., bl, c) we need a special class of
linguistic graphs over K.</p>
        <p>Jordan-Gauss graphs are linguistic graphs given by special quadratic equations over the
commutative ring K with unity such that the neighbour of each vertex is defined by the system of
linear equation given in its row-echelon form [23–25].</p>
        <p>
          Generalised Double Schubert graph DSs,r(K) (see [22] and [26] and further references) is a
bipartite graph with the points of kind (x) = (x1, x2, ..., xs, x11, x12, ..., xsr) and lines [y] = [y1, y2, ..., yr,
y11, y12, …yst] such that point (x) is incident to [y] if and if the conditions
xij-yij = xiyj
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
hold for i = 1, 2, ..., s and j = 1, 2, ..., r.
        </p>
        <p>Temporal graph DSs,r(K)t is given by equations</p>
        <p>i,jα(t)xij-i,jβ(t)yij = i,jγ(t)xiyj (2′)
where i,jα(t) and i,jβ(t) are elements of multiplicative group K* and i,jγ(t) are elements of K-{0}.</p>
        <p>To form momentum graphs D1 = DSs,r(K)t/t = 1, D2 = DSs,r(K)t/t = 2, ... we can use pseudorandom or
random sequences of elements from K* or K-{0} respectively. For the constructions genuinely
random sequences Quantum Computer can be used.</p>
        <p>Remark 4.2. Graph DSs,r(K), K = Fq is formed by spaces of dimension s and s+1 from two
corresponding largest Schubert cells of projective geometry PGs+r(Fq).</p>
        <p>In fact many other temporal Jordan-Gauss graphs and their configurations the reader can find
in [27]. These constructions are defined in terms of theory of Lie Geometries and their
generatisations [28–30].</p>
        <p>
          Proposition 3.2. [22] Let us consider map introduced above map G = L1F(a(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), a(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., a(l), b(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ),
b(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., b(l), c, D1, D2, ..., Dl)L2 in the case of the temporal graph DS s,r(K)t. Assume that deg a(i)+deg
b(i)≤d, deg c = d. Then degree of G = G(a(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), a(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., a(l), b(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), b(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., b(l), c) is d.
        </p>
        <p>
          In the case of d = 2, 3 we can use this construction to obfuscate selected multivariate
cryptosystem C, T. In particular we can take as C, T already mentioned quadratic cryptosystem
TUOV (Triangular Unbalanced Oil and Vinegar cryptosystem). We can also introduce enveloping
trapdoor accelerator for Matsumoto-Imai cryptosystem over finite fields of characteristic 2, for the
Oil and Vinegar public keys over Fq. Another quadratic multivariate public keys defined over
Jordan-Gauss graphs D(n, K), where K is arbitrary finite commutative ring with the nontrivial
multiplicative group. It gives us the option to use Proposition 3.2 in the case of arbitrary
commutative ring K [24, 31]. We can obfuscate presented above constructions of multivariate maps
of degree d with the trapdoor accelerator T below via deleting of some coordinates of points and
lines with double indexes together with corresponding equations. It will give us examples of
multivariate maps of prescribed degree with the trapdoor accelerator on arbitrary free module Kn.
Instead of generalised Schubert graph DSs,r(K) with points of kind (x) = (x1, x2, ..., xs, x11, x12, ..., xsr)
and lines [y] = [y1, y2, ..., yr, y11, y12, …, yst] we consider homomorphic image QDSs,r(K) where Q is
selected proper subset of Cartesian product of {1,2, …, s} = N and [1, 2, …, r} = M. We assume that
r = O(s), the projection (i, j) → i maps Q onto N and the projection (i, j) → j maps Q onto M. Let
Q = {α(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), α(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., α(m)} where m = O(st), 1≤t≤2. Then partition sets of QDSs,r(K) are affine space Ks+m
and Kr+m. We consider the map QF = QF(a1, a2, ..., al, b1, b2, ..., bl, c) obtained in the case of linguistic
graph QDSs,r(K). We also consider QG as L1QFL2 where L1 and L2 are bijective affine transformations of
partition sets of QDSn,k(K). We refer to graphs QDSs,r(K) as Truncated Schubert Graphs and consider
their temporal analogous QDSs,r(K)t introduced via the deletion of coordinates indexed by elements
of N∙M-Q and corresponding equations from the system (2′).
        </p>
        <p>Let D1 = DSs,r(K)t/t = 1,D2 = DSs,r(K)t/t = 2, ... stands for the momentum graphs of QDSs,r(K)t .</p>
        <p>
          Proposition 3’.2. [22] Let us consider map introduced above map G = L1F(a(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), a(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., a(l), b(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ),
b(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., b(l), c, D1, D2, ..., Dl)L2 in the case of the temporal graph QDS s,r(K)t. Assume that deg a(i)+deg
b(i)≤d, deg c = d. Then degree of G = G(a(1, a2, ..., al, b1, b2, ..., bl, c, D1, D2, ..., Dl) is d.
        </p>
        <p>Corollary. Formulated above proposition allows us to construct multivariate bijective map G of
prescribed degree d, d≥2 with the trapdoor accelerator on arbitrary affine space Kn.</p>
        <p>We can use the construction of Proposition 3’ iteratively.</p>
        <p>
          Example 1.2. Let us select finite commutative ring K and positive numbers s, m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ... to
generate the sequence of bijective maps of prescribed degree d on Ks+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), Ks+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ... with the
trapdoor accelerators.
        </p>
        <p>
          1 step. We use Proposition 3’.2 in the case of selected d, temporal Jordan-Gauss graph of type s,
r, s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) where s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )≤sr, l = l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) is even, tuples a(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = a(1, i), b(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = b(1, i) satisfy the condition of
the statement and c = (c1, c2,.., cs) has degree 1 and the map C of kind zi → ci(z1, z2, ..., zs), i = 1, 2, ..., l
is an element of AGLs(K). Let the standard form G1 from s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )CG(K) with the corresponding trapdoor
accelerator T1 be the output of the procedure.
        </p>
        <p>
          2 step and iteration. We use Proposition 3’.2 in the case of Jordan graph of type s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), r(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ),
s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) where s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) ≤(s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ))r(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), l = l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) is even, a(i) and b(i) satisfy the condition of
the statement and c coincides with the tuple g(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = (G1(z1), G1(z2), ..., G1(zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ))). Let the standard
form of G2 and its trapdoor accelerator T2 be the output of Step 2. Notice that the piece of
information T2 is an expansion of T1.
        </p>
        <p>
          We use the tuple c = g(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) = (G2(z1), G2(z2), ..., G2(zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))) and Proposition 3’ to generate the
transformation G3 of affine space Ks+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )+m(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) with the trapdoor accelerator T3 expanding T2. If we
use k as total number of steps, then the continuation of this recurrent procedure of generating
tuples g(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ), g(
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), ..., g(k-1) via free selection of even parameters l(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ), l(
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), ..., l(k) gives the
transformation Gk_of degree d on the affine space of dimension s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )+...+m(k) together with
the trapdoor accelerator Tk.
        </p>
        <p>Procedure 2.2 (reimage computation for (Gk, Tk)).</p>
        <p>
          Assume that Gj = jL1Fj jL2, j = 1,2, ..., k and Fj=F(a(1, j), a(2, j), ..., a(l(j), j), b(1, j), b(2, j), ..., b(l(j),j),
g(j-1), jD1, jD2, ..., jDl(j)) acting on the affine space jW of dimension s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )+...+m(j) = n(j).
        </p>
        <p>Alice obtained the ciphertext 0c = (0c1, 0c2, ..., 0cn(k)). She computes kL2-1(0c) = kc and takes its
projection kc’ on the first n(k-1) coordinates.</p>
        <p>
          Alice computes k-1L2-1(kc’) = k-1c and takes its projection k-1c’ on first n(k-2) coordinates. She
continue this procedure and gets the tuple 1c = (b1, b2, ..., bs, bs+1, bs+2, ..., bs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) and 1c’=(b1, b2, ..., bs).
        </p>
        <p>
          Alice forms the intermediate tuple (z1, z2, ..., zs) and investigates the system of linear equations
c1(z1, z2, ..., zs) = b1, c2(z1, z2, ..., zs) = b2, ..., cs(z1, z2, ..., zs) = bs. She gets the solution z1 = α1, z2 = α2, …,
zs = αs. Alice computes tuples a*(i, 1) = a(
          <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
          )(α1, α2, ..., αs), b*(i, 1) = b(
          <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
          )(α1,α2, ..., αs), i = 1, 2, ..., l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
with coordinates from K.
Alice takes graph 1Dl(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) and computes d(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) = Jb*(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ),1)(1c). She takes the neighbour d’(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = Na*(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )),1)
(d(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) of the point d(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) of colour a*(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), 1). Alice treats the tuple d’(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) as the line of graph 1Dl(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ).
She computes Jb*(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )-1),1) (d’(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) = d(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )-1) and its neighbour d’(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )-1) = Na*(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )-1),1) (d(l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )-1). Alice
continue this process and gets d’(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = Na*(
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ) (d(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) in the graph 1D1. So she gets e(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = Jγ(d’(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )), γ = (α1,
α2, ..., αs).
        </p>
        <p>
          The tuple (1L1)-1(e(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) = r(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) is the solution of the equation L1F1(z1, z2, zs, zs+1, ...,
zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) = 1c=1(L2)1(2c’) which is equivalent to G1(z1, z2, zs, zs+1, ..., zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) = 2c’.
        </p>
        <p>
          Alice considers the equation 2L1F2(z1, z2, ..., zs, zs+1, ..., zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+1, ..., Zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )) = 2c = 2L2(3c’). The
first s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) equations of this system are equivalent to L1F1(z1, z2, ..., zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) = 1c with the solution
γ(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = (1α1, 1α2, …, 1αs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )).
        </p>
        <p>
          Alice computes the specializations a*(
          <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
          ), a*(
          <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
          ), ..., a*(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), 2), b*(
          <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
          ), b*(
          <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
          ), ..., b*(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), 2) of
a(
          <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
          ), a(
          <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
          ), ..., a(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), 2), b(1, 2), b(
          <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
          ), ..., b(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), 2) under the substitution z1 = 1α1, z2 = 1α2, …,
zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = 1αs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ).
        </p>
        <p>
          She computes the point d(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )) = Jb*(2, l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))(2c) and line d’(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )) = Na*(2, l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))(d(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))) of the graph 2Dl(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ),
computes d(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-1) = Jb*(2, l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-1)(d’(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )) and vertex d’(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-1) = Na*(2, l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-1)(d(l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-1)) of the graph 2Dl(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )-1.
Alice continue this process and gets d’(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = Na*(
          <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
          ) (d(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) in the graph 2D1. So she gets e(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = Jγ(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )(d’(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ))
in this graph.
        </p>
        <p>
          The tuple (2L1)-1(e(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) = γ(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) is the solution of the equation 2L1F2(z1, z2, zs, zs+1, ..., zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+1, ...,
zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )) = 2c = 1(L2)-1(3c’) which is equivalent to G2(z1, z2, zs, zs+1, ..., zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )) = 3c’.
        </p>
        <p>
          Alice continue this recurrent process and gets the solution γ(k) of the equation Gk(z1, z2, zs,
zs+1, ..., zs+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )+...+m(k)) = 0c.
        </p>
        <p>
          Example 2.2. Let us select finite commutative ring K and positive numbers s, r, s≥r, m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ),
... to generate the sequence of bijective maps of prescribed degree d from Ks+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) onto Kr+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), from
Ks+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) onto Kr+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ... with the trapdoor accelerators. We will use Proposition 3’ several times
in the case of odd parameter l.
        </p>
        <p>
          1 step. We use Proposition 3’ in the case of selected d, temporal Jordan-Gauss graph of type s, r,
m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) where s≤m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )≤ sr, l = l(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) is odd, tuples a(i), b(i) satisfy the condition of the statement and
c = (c1, c2, ..., cs) has degree 1 and the map C: (z1, z2, ..., zs) → (c1(z1, z2, ..., zs), c2(z1, z2, ..., zs), …, cr(z1,
z2, ..., zs) is surjective. We can assume that linear expressions c1, c2, ..., cr are written in a row echelon
form.
        </p>
        <p>
          Let the standard form the map G1 from Ks+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )onto Kr+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) with the corresponding trapdoor
accelerator T1 be the output of this step.
        </p>
        <p>
          2 step and iteration. We use Proposition 3’ in the case of Jordan graph of type s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), r(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ),
m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) where s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )≤(s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ))(r(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), l = l(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) is odd, a(i) and b(i) satisfy the condition
of the statement and c coincides with the tuple g(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) = (G1(z1), G1(z2), ..., G1(zr+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ))). Let the standard
form of G2 and its trapdoor accelerator T2 be the output of Step 2. Notice that the piece of
information T2 is an expansion of T1.
        </p>
        <p>
          We use the tuple c = g(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) = (G2(z1), G2(z2), ..., G2(zr+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))) and Proposition 3’ to generate the map
G3 of affine space Ks+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )+m(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) onto Kr+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )+m(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) with the trapdoor accelerator T3 expanding T2. If
we use k as total number of steps, then the continuation of this recurrent procedure of generating
tuples g(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ), g(
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), ..., g(k-1) via free selection of odd parameters l(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ), l(
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), ..., l(k) gives the standard
form of the map Gk_of degree d from the affine space of dimension s+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )+...+m(k) onto free
module of dimension r+m(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )+m(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )+...+m(k) together with the trapdoor accelerator Tk.
        </p>
        <p>The procedure of reimage computation of Gk is similar to the case of Example 1.2.</p>
        <p>Remark 4. 2. (nonlinear disturbance). In both examples instead of linear map C any nonlinear
surjective map H of degree at most d with the trapdoor accelerator can be used. In particular one
can use quadratic transformations of arbitrary free module Kn presented in [24] and [31]. In the
case of Example 2. In case of finite field many classical broken or unbroken multivariate
cryptosystem can be used (see [32] and further references).</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. On the multivariate maps of prescribed density with the trapdoor accelerator</title>
      <p>
        Let Assume that commutative ring K contains nontrivial multiplicative group K*. Let us consider
the totality nES(K) of endomorphisms of K[z1, z2,..., zn] of kind
z1 → q1z1 a(
        <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
        ) z2 a(
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ) … zn a(1,n),
z2 → q2z1 a(
        <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
        ) z2 a(
        <xref ref-type="bibr" rid="ref2 ref2">2,2</xref>
        ) … zn a(2,n),
… (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
zn → qnz1 a(n,1)  z2 a(n,2)  … zn a(n,n)
where qi are regular elements of finite commutative ring K with the unity.
      </p>
      <p>
        It is easy to see that the complexity of the composition of two elements of kind (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) is O(n3).
      </p>
      <p>The semigroup nES(K) acts naturally on (K*)n and contains large subgroup nEG(K) of bijective
transformations of the variety [1].</p>
      <p>Recall that we define density den (f) of element f from K[z1, z2, ..., zn] written in its standard form
as its number of monomial terms. The density of the tuple H(z1, z2, ..., zn) is defined as maximum of
den(hi), i = 1,2, ..., m.</p>
      <p>The following statements are proven in [22].</p>
      <p>
        Proposition 1. 3. Let us consider map introduced above map F = F(a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., a(l), b(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ...,
b(l), c, D1, D2, ..., Dl) in the case of the temporal graph QDSs,r(K)t where K is a commutative ring with
nontrivial multiplicative group K*. Assume that the densities of a(i), b(i) and c are of size O(sα(i)),
O(sβ(i)) and O(sγ) such that 0≤α(i)+β(i)≤d and γ≤d for some d, d≥0. Then den F has size O(sd).
      </p>
      <p>Remark 1.3. Parameter d can be selected as a rational number.</p>
      <p>Corollary 1.3. Let s = r or l is even, r = O(s), m = O(sμ), 1≤μ≤2, H be an element of s+mES(K) and
LϵAGLs+m (K) and F satisfies conditions of Proposition 1.3. Then the density of standard form of
G = HFL is O(sd+μ) = O((s+m)d/μ+1).</p>
      <p>
        Remark 2.3. We can select L of density O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) or density O(mλ), 0≤λ≤1. The simplest case is of
kind zi → diiżi+dii+1żi+1+…+dis+mżi+sm, i = 1, 2, …, m+s. Then the density of the map is O((s+m)d/μ+λ).
      </p>
      <p>Corollary 2.3. Assume that conditions of Corollary 1.3 holds and C = EN, where EϵsEG(K),
NϵsCG(K). Then G induces an injective map of (K*)s+m into (K)s+m.</p>
      <p>Let Ms(K) = GLs(K)∩sES(K) be the monomial group of linear transformations.</p>
      <p>Corollary 3.3. Assume that conditions of Proposition 1.3 hold and
HϵMs+m (K) and CϵsCG(K). Then G is a bijective map of Ks+m onto itself.</p>
      <p>Formulated above statements allow us to construct element G of nCG(K) of unbounded degree
and prescribed density d, d≥O(n) with the trapdoor accelerator.</p>
      <p>We define multiplicative trapdoor accelerator (F, T) of F which is the map of density d such that
its restriction F’ on (K*)n is injective map and the knowledge of T allows to compute the reimage of
F’ in a polynomial time.</p>
      <p>Remark 3.3. We can construct multiplicative accelerators (F, T) where FϵnCS(K) has unbounded
degree and prescribed density O(nd ), d≥0.</p>
      <p>Algorithm 1.3. Public key with the multivariate map G with the multiplicative trapdoor
accelerator.</p>
      <p>
        Alice select even parameter l of size O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and commutative ring K with nontrivial multiplicative
group K*. Natural examples are finite field Fq or modular arithmetic Zq where q = 2 s, s&gt;1.
      </p>
      <p>
        She selects parameters n and k = O(n) together with the subset Q = {α(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), α(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., α(m)} of
Cartesian product of {1, 2, ..., n} and {1, 2, ..., k} of cardinality m, m = O(nμ) where 1≤μ≤2. Alice will
work with graph QDSn,k(R)t, k = O(n), R = K[z1, z2, ..., zn, zα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., zα(m)]. She selects parameter d and
tuples of polynomials a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., a(l), b(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., b(l) with coordinates from K[z1, z2, ..., zn]
satisfying conditions of Proposition 1.3, i.e. den(a(i)) has size O(s α(i)),
den(b(i)) has size O(s β(i)) and α(i)+β(i) = d.
      </p>
      <p>
        Alice forms the tuples ai, bi, i = 1, 2, ... l of with coordinates of kind q1z1 a(
        <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
        ) z2 a(
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ) … zn a(1,s)+q2z1
a(
        <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
        ) z2 a(
        <xref ref-type="bibr" rid="ref2 ref2">2,2</xref>
        ) … zn a(2,n)+…+qrz1 a(r,1) z2 a(r,2) … zn a(r,n) where qi ≠ 0.
She selects the pair of E, E’ϵnEG(K) such that (EE’, (K*)n) and (E’E, (K*)s) are identity permutations.
      </p>
      <p>
        The procedure 1 for this step is given below. She takes N of density O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) from AGLn(K) and L
from AGLn+m(K) together with H and H’ from m+nEG(K) such that HH’ and H’H are identity
transformations of (K*)s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). Alice computes C=EN moving (z1, z2, ..., zn) to c = (c(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), c(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., c(n)).
      </p>
      <p>She select parameters i,jα(t)ϵK*, i,jβ(t) and i,jγ(t) where t = 1, 2, ..., l, (i, j)ϵQ for construction of
momentum Jordan-Gauss graphs D1, D2, ..., Dl of the temporary graph QDSs,k(K)t.</p>
      <p>
        Alice will use Dj(K[z1, z2, ..., zs, zα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., zα(m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))]) which are special momentum graphs of
QDSs,k(R)t defined by equations with coefficients from K but with the point set Rn+m and line set Rk+m.
      </p>
      <p>
        She uses symbolic computation in the graph QDSn,k(R)t to construct the transformation F = F(a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ),
a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., a(l), b(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., b(l), c, D1, D2, ..., Dl) of Kn+m to itself. Alice uses Procedure 1 to form H from
n+m EG(K). She forms L from AGLn+m(K) of density O(mλ), λ≤1 and the element G = HFL of affine
Cremona semigroup. She computes the standard form of G and announces this multivariate rule
publicly.
      </p>
      <p>The standard form of G will be used as an encryption tool in the case of the space of plaintexts
(K*)n+m.</p>
      <p>Alice generates the map via special walks on the graph. The degree of the map G is O(n+m). The
density of the map is O(n+m) λ+d/μ.</p>
      <p>Thus the complexity of encryption of computation of the image of (p1, p2, ..., pn+m)ϵ(K*)m+n is
O(n+m)λ+d/μ+1.</p>
      <p>Decryption procedure.</p>
      <p>Public user Bob writes his plaintext p = (p1, p2, ..., pm+n) and sends the ciphertext s = G(p) to Alice.
Alice decrypts via the following procedure.</p>
      <p>
        She computes L-1(s) = (d1, d2, ..., dn, dα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), dα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., dα(m)) = d. Alice creates intermediate tuple of
variables (z1, z2, ..., zn, zα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., zα(m)) consider the equations. She computes N-1(d1, d2, ..., dn) = (e1, e2,
..., en) and considers the equations
      </p>
      <p>E(z1, z2,..., zn) = e1,
E(z1, z2,..., zn) = e2,
...,
E(z1, z2,..., zn) = en,
Alice uses E’ and gets the solution z1 = t1, z2 = t2, ..., zn = tn.</p>
      <p>
        She computes a(i)(t1, t2, ..., tn) = a*i, i = 1, 2, ..., l, b(i)(t1, t2, ..., tn) = b*i, i = 1, 2, ..., l and writes the
system of linear equations F = F(a*(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), a*(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), …, a*(l), b*(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), b*(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., b*(l), d’)(t1, t2, ..., tn, zα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ...,
zα(m)) = d where d’ = (d1, d2, ..., dn).
      </p>
      <p>This system is already written in row-echelon form.</p>
      <p>
        So Alice gets the solution zα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = tα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = tα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),...,zα(m) = tα(m).
      </p>
      <p>
        She forms t = (t1, t2, ..., tn, tα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), tα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., tα(m)) and p as H’(t).
      </p>
      <p>Procedure 1.3. Let K be a finite commutative ring with unity and nontrivial multiplicative
group K* of order d&gt;1. Assume that parameter n is selected and we have the task of generating two
elements E and E’ of nEG(K) such that EE’ and E’E act on (K*)n as identity transformations.</p>
      <p>
        We form the transformation J1 and J2 from nEG(K) of kind
y1 = μ1x1a(
        <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
        )
y2 = μ2x1a(
        <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
        ) x2a(
        <xref ref-type="bibr" rid="ref2 ref2">2,2</xref>
        )
…
yn = μnx1a(n,1) x2a(n,2) … xna(n,n)
where (a(
        <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
        ), d) = 1, (a(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), d) = 1, …, (a(n, n), d) = 1,
z1 = μ’1y1b(
        <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
        ) y2b(
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ) … ynb(1,n)
z2 = μ’1y2b(
        <xref ref-type="bibr" rid="ref2 ref2">2,2</xref>
        ) y2b(
        <xref ref-type="bibr" rid="ref2 ref3">2,3</xref>
        ) … ynb(2,n)
…
zn = μ’nynb(n,n)
where (b(n,n), d) = 1, (b(n-1, 2), d) = 1, …, (b(1, n), d) = 1.
The computation of inverses J’1 and J’2 of the transformations J1 and J2 of the variety (K*) n is
straightforward. So Alice computes E = J1J2 and E’ = J’2J’1.
      </p>
      <p>Similarly, she constructs lower triangular and upper triangular bijective transformations JG1
and JG2 from (m+nES(K), (K*)m+n).</p>
      <p>So Alice computes H = GJ1 GJ2 and H’ = GJ’2 GJ’1.</p>
      <p>
        In case d = 0 and λ = 0 when the density of a(i), b(i), and L are O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) we obtain a pseudolinear
cryptosystem. Its complexity for the encryption is O(n+m)2.
      </p>
      <p>In the case of d/μ+λ&lt;1 we get sub quadratic cryptosystem. It has complexity better than
O(n+m)3.</p>
      <p>If d/μ+λ = 1 we obtain a pseudo quadratic cryptosystem.</p>
      <p>More general methods of generation of invertible elements of nES(K) can be found in [1].</p>
      <p>The family of pseudo quadratic transformations with the trapdoor accelerators based on the
modification DSn,k(K) in terms of generalisations of projective geometries was presented in [33].</p>
      <p>Corollary 4.3. Let K be a commutative ring with nontrivial multiplicative group K*. Then for each
natural n, n&gt;2 we can construct a multivariate map of the prescribed density with the multiplicative
trapdoor accelerator.</p>
      <p>Recall that G = EQQL induces an injective map of (K*)n+m into Kn+m.</p>
      <p>The standard form of G has the trapdoor accelerator Q, E, L, H, N, ai, bi, i = 1, 2, ..., l, T’. We assume
that equations of DS(n, K) are known publicly.</p>
      <p>Remark 4.3. Note that the map with the trapdoor accelerator of polynomial density O(nd)
where d, d ≥2 is a natural number can be obtained as the product of J1 and J2 of Procedure 1 and
selected multivariate map F of degree d with the trapdoor accelerator T.</p>
      <p>In [34] the first implementation of the scheme of the previous Remark 4.3 was presented in the
case of F induced by the special walk on the Jordan-Gauss graphs D(n, K) and A(n, K) for the case
when K = Fq, of characteristic 2. Recall that in [24] the special walks of odd length in the
JordanGauss graphs D(n, K) of type 1, 1, n-1 were used for the generation of quadratic multivariate map F
with the trapdoor accelerator.</p>
      <p>In [35] the scheme of remark 4.3 was suggested for the graph-based encryption with D(n, K) and
A(n, K) in the case of arithmetical rings Zm.</p>
      <p>The point (p) = (p1, p2, …, pn) of the graph D(n, K) is incident with the line [l] = [l1, l2, …, ln], if the
following relations between their coordinates hold:
l2-p2 = l1p1, l3-p3 = l2p1, l4-p4 = l1p2, li-pi = l1pi-2, li+1-pi+1 = li-1p1, li+2-pi+2 = lip1, li+3-pi+3=l1pi+1 where i≥5.</p>
      <p>
        So the encryption scheme is the following. Let us take graph D(n, K[x1, x2, …, xn]), sequence of
colors d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+x1,d(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+ x1, …, d(k)+x1 where d(i) ϵK), k is a length of walk.
      </p>
      <p>
        Then we have to take sequence x = (x1, x2, …, xn) (point from D(n, K[x1, x2, …, xn])), v1 = Nd(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+x1(x),
Nd(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+x1(v1) = v2, Nd(k)+x1(vk-1) = v1.
      </p>
      <p>Let F be the map x1 → v1(x1, x2, …, xn ), x2 → v2(x1, x2, …, xn), …, xn → vn(x1, x2, …, xn). Then deg
F = 3.</p>
      <p>We consider the map of kind G = J1J2L1FL2 where L1 and L2 are elements of AGLn(K).</p>
      <p>In the case of linguistic graph A(n, K) we simply change the incidence condition between points
and lines:
l2-p2 = l1p1, l3-p3 = p1l2,l4-p4 = l1p3, l5-p5 = p1l4, …
ln-pn = l1pn-1 (for even n) or ln-pn = p1ln-1 (for odd n).</p>
      <p>Recently we implement the generating process described above map G in the case when K is
arithmetic ring Zq, q=232.</p>
      <p>
        Let us denote G as G(n, k, K) in the case when the length of the sequence of colours d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), d(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),…,
d(k) has length k. We present time the total number M(G) of monomial terms in all gi (global
density). We refer to parameter k as the length of the walk. We can see the “condensed matter
physics” digital effect. If k is “sufficiently large”, then M(g) is independent of k constant c.
      </p>
      <p>We have written a program for generating elements and for encrypting a text using the
generated public key. The program is written in C++. We use an average PC with processor
Pentium 3.00 GHz, 2GB memory RAM, and system Windows 7.
We have implemented three cases:
1. L1 and L2 are identities.
2. L1 and L2 are maps of kind z1 → z1+a2z2+a3z3+ … +atzt, z2 → z2, z3 → z3, …, zn → zn, ai ≠ 0, i = 1,
2, …, n (linear time of computing for L1 and L2).
3. L1 = Ax+b, L2 = A1x+b1; matrices A, A1 and vectors b, b1 have mostly nonzero elements.
Tables confirm that in Cases 2 and 3 we have multivariate transformations of density O(n3) and
global O(n4). So, the encryption process for this map of unbounded degree takes O(n5).</p>
      <p>Similarly to Example 1 we can use Proposition 4 iteratively.</p>
      <p>Example 1.3. Alice selects finite commutative ring K and positive number s and prescribed
degree d.</p>
      <p>
        Step 1. Alice selects even parameter l = l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) of size O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and the degree d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) of the initial map and
parameter μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), 1≤μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )≤2.
      </p>
      <p>
        She takes parameter k = O(s) together with the subset Q = {α(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), α(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., α(m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))} of Cartesian
product of {1, 2, ..., s} and {1, 2, ..., k} of cardinality m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = O(sμ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) where 1≤μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )≤2. Alice will
work with graph QDSs,k(R) t, k = O(s), R = K[z1, z2, ..., zs, zα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., zα(m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))]. She selects tuples of
polynomials a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = a(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = a(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), ..., a(l) = a(1, l), b(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), ..., b(1, l), l = l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) with
coordinates from K[z1, z2, ..., zs] satisfying conditions of Proposition 4, i.e.
      </p>
      <p>
        deg (a(i)) = α(i), deg b(i) = β(i) and α(i)+β(i) = d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ).
      </p>
      <p>
        Alice forms the tuples ai, bi, i = 1, 2, .... l of with coordinates of kind q1z1 a(
        <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
        ) z2 a(
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ) … zs a(1,s) +q2z1 a(
        <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
        )
z2 a(
        <xref ref-type="bibr" rid="ref2 ref2">2,2</xref>
        ) … zs a(2,s)+…+qrz1 a(r,1) z2 a(r,2) … zs a(r,s) where qi ≠ 0.
      </p>
      <p>
        She selects the pair of E, E’ϵsEG(K) such that (EE’, (K*)s) and (E’E, (K*)s) are identity
permutations. She takes N of density O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) from AGLs(K) and L of density O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) from AGLs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(K)
together with H = H1 and H’ = H’1 from m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+sEG(K) such that HH’ and H’H are identity
transformations of (K*)s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). Alice computes C = EN moving (z1, z2, ..., zs) to c = (c(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), c(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),..., c(s)).
She selects parameters i,jα1(t)ϵK*, i,jβ1(t) and i,jγ1(t) where t = 1, 2, ..., l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), (i, j)ϵQ for the construction
of momentum Jordan-Gauss graphs 1D1, 1D2, ..., 1Dl of the temporary graph QDSs,k(K)t.
      </p>
      <p>
        Alice will use 1Dj(K[z1, z2, ..., zs, zα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., zα(m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))]) which are special momentum graphs of
QDSs,k(R)t, R = K[z1, z2, ..., zs, zα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., zα(m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))]) defined by equations of 1D1, 1D2, ..., 1Dl with
coefficients from K but with the point set Rs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and line set Rk+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ).
      </p>
      <p>
        She uses symbolic computation in the graph QDSs,k(R) t to construct the transformation
F = F1 = F(a(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), ..., a(1, l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )), b(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), ..., b(1, l), c, 1D1, 1D2, ..., 1Dl(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) of Ks+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). She already
formed L = L1 from AGLs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(K) of density O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). Alice computes the element G1=H1F1L1 of affine
Cremona semigroup. She computes the standard form of G1. The degree of the map G1 is
O(s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )).The density of the map is O(s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )/μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). The trapdoor accelerator T1 consist of Q,
equations of QDSs,k(K), tuples a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., a(l), b(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., b(l) and momentum graphs,
transformations E, N and H1, L1.
      </p>
      <p>Step 2 and the iteration.</p>
      <p>
        Alice selects parameter k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = O(s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) and positive integer s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )≤m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )≤s+m(k)k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), even
parameter l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and constants d(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), d(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )≥d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )/μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and μ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) where 1≤μ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )≤2. She selects the subset
Q(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = {α(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        ), α(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), ..., α(1, m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ))} of Cartesian product of {1, 2, ..., s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )} and {1, 2, ..., k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )} of
cardinality m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = O((s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))μ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )). Alice will work with graph Q(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )DSs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ),k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(R)t, R = K[z1, z2, ...,
zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), ..., zα(1, m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ))]. She selects parameters to create momentum graphs 2D1, 2D2, ..., 2Dl(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) of
the temporary graph Q(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )DSs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ),k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(K)t.
      </p>
      <p>
        Alice will use 2Dj(K[z1, z2, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), ..., zα(1, m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ))]),
      </p>
      <p>
        J = 1, 2, ..., l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) which are special momentum graphs of QDSs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(R)t, R = K[z1, z2, ..., zs, zα(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),
..., zα(m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))]) defined by equations of 2D1, 2D2, ..., 2Dl(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) with coefficients from K but with the point set
Rs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and line set Rk(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(1+)m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ).
      </p>
      <p>
        She selects tuples a(
        <xref ref-type="bibr" rid="ref1 ref2">2, 1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., a(2, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )), b(
        <xref ref-type="bibr" rid="ref1 ref2">2, 1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., b(2, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) with coordinates from
K[z1, z2, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )] such that den (a(2, i)b(2, i)) = O((s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))d(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )). Alice constructs the transformation
F2 = F(a(
        <xref ref-type="bibr" rid="ref1 ref2">2, 1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., a(2, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )), b(
        <xref ref-type="bibr" rid="ref1 ref2">2, 1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., b(2, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )), g(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), 2D1, 2D2, ..., 2Dl(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) of Ks+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) where
g1 is the tuple (G1(z1), G1(z2), ..., G1(zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )). She selects the pair of H2, H2’ϵs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )EG(K) such that
(H2H2’, (K*)s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) is identity permutations.
      </p>
      <p>
        She selects L = L2 from AGLs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(K) of density O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and forms
      </p>
      <p>G2=H2F2L2.</p>
      <p>
        The density of the standard form of the map G2 will be determined as O((s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))d(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) or
O((s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ))d(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )/μ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )).The map G2 has a multiplicative trapdoor accelerator T2 which is extension of
T1 via adding Q(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) of cardinality m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), parameters k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) equations of Q(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )DSs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) (K), tuples
a(2.1), a(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., a(2, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )), b(
        <xref ref-type="bibr" rid="ref1 ref2">2, 1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., b(2, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )), momentum graphs 2D1, 2D2, ..., 2Dl(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and
transformations H2, H2’, L2.
      </p>
      <p>
        Alice takes parameters d(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), d(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )≥d(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )/μ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), μ(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), 1≤μ(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ))≤2, k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) of size O(s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) and m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
of size O( (s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ))μ(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) such that s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )≤m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )≤(s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ))k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ). She takes even
parameter l(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) and selects subset Q(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = { α(
        <xref ref-type="bibr" rid="ref1 ref2">2, 1</xref>
        ), α(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., α(2, m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ))} of Cartesian product of {1, 2,
..., s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )} and {1, 2, ..., k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )}.
      </p>
      <p>
        Alice will work with graph Q(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )DSs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(R)t, R = K[z1, z2, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
        ), zα(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., zα(2, m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ))]. She
selects parameters to create momentum graphs 3D1, 3D2, ..., 3Dl(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) of the temporary graph
Q(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )DSs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(K)t.
      </p>
      <p>
        Alice forms tuples a(
        <xref ref-type="bibr" rid="ref1 ref3">3, 1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2 ref3">3, 2</xref>
        ), ..., a(3, l(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )), b(
        <xref ref-type="bibr" rid="ref1 ref3">3, 1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref2 ref3">3, 2</xref>
        ), ..., b(3, l(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )) with coordinates from
K[z1, z2, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ] such that den (a(3, i)b(3, i)) = O((s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ))d(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ). Alice constructs the
transformation F3 = F(a(
        <xref ref-type="bibr" rid="ref1 ref3">3, 1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2 ref3">3, 2</xref>
        ), ..., a(3, l(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )), b(
        <xref ref-type="bibr" rid="ref1 ref3">3, 1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref2 ref3">3, 2</xref>
        ), ..., b(3, l(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )), g(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), 3D1, 3D2, ..., 3Dl(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )) of
Ks+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) where g(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) is the tuple (G2(z1), G2(z2), ..., G2(zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )).
      </p>
      <p>
        She selects the pair of H3, H3’ϵs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )EG(K) such that (H3H3’, (K*)s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )) is identity
permutation.
She selects L = L3 from AGLs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )(K) of density O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and forms G3 = H3F3L3.
      </p>
      <p>
        The density of the standard form of the map G3 will be determined as O((s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) d(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )) or
O((s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )) d(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )/μ(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )). The map G3 has a multiplicative trapdoor accelerator T3 which is
extension of T2 via adding Q(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) of cardinality m(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), parameters k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), l(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), equations of
Q(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )DSs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ,k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) (K), tuples a(
        <xref ref-type="bibr" rid="ref1 ref3">3, 1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2 ref3">3, 2</xref>
        ), ..., a(3, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )), b(
        <xref ref-type="bibr" rid="ref1 ref3">3, 1</xref>
        ), b(
        <xref ref-type="bibr" rid="ref2 ref3">3, 2</xref>
        ), ..., b(3, l(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )), momentum graphs
3D1, 3D2, ..., 3Dl(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) and transformations H3, H3’, L3.
      </p>
      <p>Alice continues the iterative process. She creates G4, G5, ..., Gr of the densities of kind O(n(i)) β(i),
i = 4, 5, ..., r where n(i) is the dimension of the space of ciphertexts and β(i) = d(i)/μ(i) with the
multiplicative trapdoor accelerators Ti, i =4, 5, ..., r respectively.</p>
      <p>
        So the final map Gr of Ks+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+…+m(r) to itself with the multiplicative trapdoor accelerator Tr has
a polynomial density.
      </p>
      <p>
        Recall that d(i)≥d(i-1)/μ(i-1) for i = 2, 3, ..., r. In the case when these inequalities become
equalities d(r)/μ (r) = d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )/(μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )μ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )μ(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) ... μ(r)).
      </p>
      <p>
        Alice can select d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = 0 when Gr has density O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). Then the output will be a pseudolinear map.
The choice of small parameter d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) will allow her to get sub quadratic map of the density O(nλ) with
arbitrarily selected λ, λ&lt;1. Obviously, Alice can create the map Gr of prescribed density O(nd) with
the multiplicative trapdoor accelerator.
      </p>
      <p>Note that Alice can take Gr L where L has degree 1 and density O(n) and use the standard form
of transformation of density O(nd+1) with the multiplicative trapdoor accelerator.</p>
      <p>
        Procedure 1.3. (reimage computation for (Gr, Tr)). Assume that Gj = HjFjLj, j = 1, 2, ..., r and
Fj = F(a(1, j), a(2, j), ..., a(l(j), j), b(1, j), b(2, j), ..., b(l(j),j), g(j-1), jD1, jD2, ..., jDl(j)) acting on the affine
space jW of dimension s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+...+m(j) = n(j).
      </p>
      <p>Alice obtained the ciphertext 0c = (0c1, 0c2, ..., 0cn(r)). She computes Lr-1(0c) = rc and takes its
projection rc’ on the first n(r-1) coordinates.</p>
      <p>
        Alice computes Lr-1-1(rc’) = r-1c and takes its projection r-1c’ on the first n(r-2) coordinates. She
continue this procedure and gets the tuples 1c = (b1, b2, ..., bs, bs+1, bs+2, ..., bs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) and 1c’ = (b1, b2, ...,
bs).
      </p>
      <p>Alice forms the intermediate tuple (z1, z2, ..., zs) and investigates the system of linear equations
c1(z1, z2, ..., zs) = b1,c2(z1, z2, ..., zs) = b2, ..., cs(z1, z2, ..., zs) = bs. She gets the solution z1 = α1, z2 = α2, …,
zs = αs. In fact (α1, α2, …, αs) = E’(N-1(b1, b2, …, bs)).</p>
      <p>
        Alice computes tuples a*(i, 1) = a(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        )(α1, α2, ..., αs), b*(i, 1) = b(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        )(α1,α2, ..., αs), i = 1, 2, ..., l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
with coordinates from K.
      </p>
      <p>
        Alice takes graph 1Dl(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and computes d(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = Jb*(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ),1)(1c). She takes the neighbour d’(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = Na*(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )),1)
(d(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) of the point d(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) of colour a*(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), 1).
      </p>
      <p>
        Alice treats the tuple d’(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) as the line of the graph 1Dl(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). She computes Jb*(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )-1),1)
(d’(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = d(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )1) and its neighbour d’(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )-1) = N a*(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )-1),1) (d(l(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )-1). Alice continue this process and gets d’(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = N
a*(
        <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
        ) (d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) in the graph 1D1. So she gets e(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = Jγ(d’(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )), γ = (α1,α2,..., αs).
      </p>
      <p>
        The tuple (H1)’(e(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = r(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) is the solution of the equation H1F1(z1, z2, zs, zs+1, ...,
zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = 1c = (L1)1(2c’) which is equivalent to G1(z1, z2, zs, zs+1, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = 2c’.
      </p>
      <p>
        Alice considers the equation H2F2(z1, z2, ..., zs, zs+1, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+1, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) = 2c = L2(3c’).
      </p>
      <p>
        The first s+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) equations of this system are equivalent to H1F1(z1, z2, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = 1c with the
solution γ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = (1α1, 1α2, …, 1αs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) obtained due to the knowledge of the trapdoor accelerator.
      </p>
      <p>
        Alice computes the specializations a*(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), a*(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., a*(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), 2), b*(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), b*(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., b*(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), 2) of
a(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., a(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), 2), b(1, 2), b(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        ), ..., b(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), 2) under the substitution z1 = 1α1, z2 = 1α2, …,
zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = 1αs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ).
      </p>
      <p>
        She computes the point d(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) = Jb*(2, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ))(2c) and line d’(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) = Na*(2, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ))(d(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ))) of the graph 2Dl(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),
computes d(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )-1) = Jb*(2, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )-1)(d’(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) and vertex d’(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )-1) = Na*(2, l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )-1)(d(l(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )-1)) of the graph 2Dl(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )-1.
Alice continue this process and gets d’(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )= N a*(
        <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
        ) (d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) in the graph 2D1. So she gets e(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = Jγ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(d’(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))
in this graph.
      </p>
      <p>
        The tuple (H2)’(e(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) = γ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) is the solution of the equation H2F2(z1, z2, zs, zs+1, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+1, ...,
zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) = 2c=L2(3c’) which is equivalent to G2(z1, z2, zs, zs+1, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) = 3c’. Alice continue this
recurrent process and gets the solution γ(r) of the equation Gr(z1, z2, zs, zs+1, ..., zs+m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+m(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+...+m(k)) = 0c.
      </p>
      <p>Remark 5.3. (nonlinear disturbance). In this iterative algorithm instead of the combination EN
on Ks one can take any pseudolinear map Z with the multiplicative trapdoor accelerator at most d
with the trapdoor accelerator can be used.</p>
    </sec>
    <sec id="sec-4">
      <title>4. On the safe delivery of multivariate maps</title>
      <sec id="sec-4-1">
        <title>4.1. On protocols of Noncommutative Cryptography</title>
        <p>The following protocol is one of the classical instruments of Noncommutative Cryptography.</p>
        <p>Twisted Diffie-Hellman protocol.</p>
        <p>Similarly, let S be an abstract group which has some invertible elements.</p>
        <p>Alice and Bob pose common element gϵS and the pair of invertible elements h, h -1 from this
semigroup.</p>
        <p>Alice selects natural numbers k(A) and r(A), and she forms
h-r(A)gk(A)hr(A) = gA.</p>
        <p>Bob chooses k(B) and r(B), and he forms h-r(B)gk(B)hr(B) = gB.</p>
        <p>They exchange gA, gB and compute the collision element X as
Ag = h-r(A)gBk(A)hr(A)
(Alice) and Bg = h-r(B)gAk(B)hr(B) (Bob) respectively.</p>
        <p>The security of this scheme is based on the complexity of the Power Conjugacy Problem, the
adversary has to solve the equation h-xgyhx = b, where b coincides with gB or gA. The complexity of
this problem essentially depends on the choice of highly noncommutative platform S.</p>
        <p>In the case of platform S = nES(K) where K = Fq or K = Zq this problem is intractable even with
the use of a quantum computer.</p>
        <p>The computational complexity of this protocol is O(n3).</p>
        <p>
          If we assume that the degree of transformations h and g from nES(K) is O(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) then the complexity
of the protocol is O(n).
        </p>
        <p>Other platforms defined in terms of multivariate cryptography and corresponding protocols
readers can be found in [22, 36–41].</p>
        <p>Foundations of Noncommutative Cryptography, description of algorithms and cryptanalytic
results reader can find in [42–62].</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Some definitions</title>
        <p>Let F be the map from (K*)n in Kn of density O(nd), 0≤d≤1 such that its restriction on (K*) n is
injective. Assume that T is a multiplicative trapdoor accelerator of F and Alice has the pair (F, T).</p>
        <p>Below please find examples of the deformation.</p>
        <p>Example 1.4. (the case of maps of unbounded degree).</p>
        <p>
          Alice and Bob conduct Twisted Diffie-Hellman protocol based on the platform nES(K). Assume
that the collision map C is given by formula (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ). Correspondents can use subsemigroup of nES(K)
with generators from the set M = {g, h, C}. They use open channel to agree on words wj(C) = (jgi(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ),
jgi(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), …, jgi(s(j))) of length s(j), s(j)≥1 where jgi(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), jgi(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., jgi(s(j)), j = 1, 2, ..., r is the sequence of elements of
the alphabet M which contains at least one appearance of C.
        </p>
        <p>Let jg(C) be an element of nES(K) generated as a product of characters of the wj(C). We form jh(C)
sending xi to jg(C )(xi)a(i, j) where a(i, j) are publicly known elements of K-{0}.</p>
        <p>Let G(C) be the sum 1h(C )+2h(C)+... rh(C).</p>
        <p>Alice can send the tuple (F(x1)+G(C) (x1), F(x2)+G(C)(x2), ...</p>
        <p>F(xn)+G(C)(xn)) to Bob. He is able to restore the map F.</p>
        <p>This “steganographic” way of safe delivery of the multivariate map is secure even in the case r is
a linear expression from n of size O(n).</p>
        <p>Example 2.4. (the case of nonlinear transformation of constant degree d).</p>
        <p>
          Alice takes the collision element C and nonempty subsets of {1, 2, ..., n} of kind {i(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), i(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), ..., i(m)}
of cardinality m, 1≤m≤d.
        </p>
        <p>
          She form gi as the linear combination of monomial terms (qi(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )) a(i, i(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ))(qi(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )) a(i, i(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ))...(qi(m)) a(i, i(m))...
xi(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )xi(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )...xi(m) and constant C(xi)(q1, q2,..., qm) with known nonzero coefficients from K. Alice sends
(F(x1)+g1, F(x2)+g2, ..., F(xn)+gn) to Bob.
        </p>
        <p>Remark 1.4. Assuming that the map F of degree O(n) is not given publicly, Alice and Bob use it
in a protocol-based secure way.</p>
        <p>An adversary may intercept a polynomial number of pairs of kind plaintext/ciphertext but even
this information can be insufficient for restoration of F without the knowledge of the symbolic type
of Z, i.e. lists of nontrivial monomial terms of F(xi) with coefficients 1.</p>
        <p>Remark 2.4. It is known that a polynomial system of equations of degree d(n) can be rewritten
as a system of quadratic equations via the method of introducing extra variables. If the degree is
unbounded then the growth of the number of variables does not allow for investigating the
resulting quadratic system. In case when the system is not given publicly the method of degree
reduction can not be used.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>The technique of Jordan-Gauss graphs and their temporal analog defined over arbitrary
commutative ring K can be used for the construction of bijective multivariate map F of prescribed
degree d on free module Kn with the trapdoor accelerator T which allows computing the reimage of
the given value in a polynomial time. In the case of d = 2 and 3 such maps can be used for the
construction of public keys.</p>
      <p>If d is a constant larger than 3 we can construct sparse maps of density O(n) with the trapdoor
accelerator T. So the value of the function can be computed in time O(n2). For each constant d, we
can construct the map of degree d, density O(n), and trapdoor accelerator which allows the
computation of the reimage in time O(n2). Recall that we define the density of F as the maximal
density of polynomials F(xi) for i = 1, 2, ..., n.</p>
      <p>It is known that there is a special way to increase the number of variables and rewrite the
nonlinear system F(x)=b as equivalent to it quadratic system in many variables. One can select
“sufficiently large” d such that the corresponding quadratic system is unfeasible for cryptanalytic
investigation.</p>
      <p>We define sup(t) of the monomial term t = t(x1, x2, ..., xn) as the number of variables xi in positive
power in the expression of t. The support of the multivariate map F is defined as the maximal value
of sup(F) supports its monomial terms. We can construct multivariate maps on Kn with the
prescribed density O(nα), 0≤α≤1, and prescribed support O(nβ) with the trapdoor accelerator. We
construct multivariate map F of unbounded degree with the support n and prescribed density O(nβ)
and multiplicative trapdoor accelerator.</p>
      <p>Mentioned above pairs of kind (F, T) can be investigated as potential public key constructions of
multivariate Cryptography. Alternatively, Alice can use her pair (F, T) in a different way. She and
her trusted partner Bob can use twisted Diffie-Hellman protocol with the platform nES(K), and
deform the output E via its transformation to polynomial transformation D(E) of Kn. Alice sends
F+D(E) to Bob. The security of this asymmetric algorithm described in Section 1 rests on the
security of the selected protocol.</p>
      <p>Note that the mentioned above pairs (F, T) can be used as stream ciphers when the knowledge of
T is shared between Alice and Bob.</p>
      <sec id="sec-5-1">
        <title>Acknowledgments</title>
        <p>This research is partially supported by the British Academy Fellowship for Researchers under Risk
2022.</p>
      </sec>
      <sec id="sec-5-2">
        <title>Declaration on Generative AI</title>
        <p>
          While preparing this work, the authors used the AI program Strike Plagiarism to search for
possible plagiarism. After using this tool, the authors reviewed and edited the content as needed
and took full responsibility for the publication’s content.
[23] V. Ustimenko, O. Pustovit, Jordan-Gauss graphs and quadratic public keys of multivariate
cryptography, in: ITTAP 2024, 4th International Workshop on Information Technologies:
Theoretical and Applied Problems, vol. 3896, 2024.
[24] V. Ustimenko, T. Chojecki, A. Wróblewska, On the Jordan-Gauss graphs andmultivariate
public keys, in: IACR Cryptol. ePrint Arch., 2024/1793.
[25] T. Chojecki, et al., On affine forestry over integral domains and families of deep Jordan-Gauss
graphs, Eur. J. Math. 11(
          <xref ref-type="bibr" rid="ref10">10</xref>
          ) (2025). doi:10.1007/s40879-024-00798-2
[26] V. Ustimenko, On computations with double schubert automaton and stable maps of
multivariate cryptography, Interdiscip. Stud. Complex Syst. 19 (2021) 18–32.
doi:10.31392/iscs.2021.19.018
[27] V. Ustimenko, On small world non Sunada twins and cellular Voronoi diagrams, Algebr.
        </p>
        <p>
          Discret. Math. 30(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) (2020) 118–142.
[28] A. Brower, A. Cohen, A. Nuemaier, Distance regular graphs, Springer, 1989.
[29] R. W. Carter, Simple Groups of Lie Type, Wiley, 1972.
[30] F. Buekenhout (Editor), Handbook on incidence geometry, North Holland, 1995.
[31] V. Ustimenko, A. Wróblewska, On extremal algebraic graphs, quadratic multivariate public
keys and temporal rules, in: FedCSIS, 2023, 1173–1178.
[32] J. Ding, A. Petzoldt, D. S. Schmidt, Multivariate public key cryptosystems, 2nd ed., Advances in
        </p>
        <p>Information Security, Springer, 2020. doi:10.1007/978-1-0716-0987-3
[33] V. Ustimenko, O. Pustovit, On Schubert cells of projective geometry and pseudo-quadratic
public keys of multivariate cryptography, in: Cybersecurity Providing in Information and
Telecommunication Systems II, vol. 3826, 2024, 198–205.
[34] V. Ustimenko. O. Pustovit, On the implementations of new multivariate public keys based on
transformations of linear degree, in: Proceedings of the Conference on Mathematical
Foundations of Informatics MFOI 2919.
[35] V. Ustimenko, On new multivariate cryptosystems based on hidden Eulerian equations,</p>
        <p>
          Dopovidi of National Academy of Science of Ukraine N5, 2017.
[36] V. Ustimenko, A. Wroblewska, On the key exchange with nonlinear polynomial maps of stable
degree, Annalles UMCS Informatica AI XI, 2 (2011) 81–93.
[37] V. Ustimenko, On short digital signatures with Eulerian transformations, IACR e-print archive,
2024/001.
[38] V. Ustimenko, On the restoration of historical matsumoto-imai cryptosystem and other
schemes in terms of noncommutative cryptography, in: Future Technologies Conference (FTC)
2024, vol. 2, FTC 2024, Lecture Notes in Networks and Systems, vol. 1155.
doi:10.1007/978-3031-73122-8_7
[39] V. Ustimenko, M. Klisowski, On noncommutative cryptography with cubical multivariate
maps of predictable density, in: Intelligent Computing, CompCom 2019, Advances in
Intelligent Systems and Computing, vol. 998, 2019, 654–674.
[40] V. Ustimenko, M. Klisowski, On new protocols of noncommutative cryptography in terms of
homomorphism of stable multivariate transformation groups, Algebra Discrete Math. 35(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
(2023) 220–250. doi:10.12958/adm1523
[41] V. Ustimenko, On multivariate algorithms of digital signatures on secure El Gamal-type mode,
Computational Methods and Mathematical Modeling in Cyberphysics and Engineering
Applications 1, 2024.
[42] D. N. Moldovyan, N. A. Moldovyan, A new hard problem over non-commutative finite groups
for cryptographic protocols, in: international conference on mathematical methods, models,
and architectures for computer network security, MMM-ACNS 2010: Computer Network
Security, 2010, 183–194.
[43] L. Sakalauskas, P. Tvarijonas, A. Raulynaitis, Key agreement protocol (KAP) using conjugacy
and discrete logarithm problem in group representation level, Informatica 18(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) (2007) 115–
124.
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On Eulerian semigroups of multivariate transformations and their cryptographic applications</article-title>
          ,
          <source>Eur. J. Math</source>
          .
          <volume>9</volume>
          (
          <issue>93</issue>
          ) (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J. </given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Petzoldt, Current state of multivariate cryptography</article-title>
          .
          <source>IEEE Secur. Priv</source>
          .
          <volume>15</volume>
          (
          <issue>4</issue>
          ) (
          <year>2017</year>
          )
          <fpage>28</fpage>
          -
          <lpage>36</lpage>
          . doi:
          <volume>10</volume>
          .1109/MSP.
          <year>2017</year>
          .3151328
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Smith-Tone</surname>
          </string-name>
          ,
          <article-title>2F-A new method for constructing efficient multivariate encryption schemes</article-title>
          ,
          <source>in: PQCrypto</source>
          <year>2022</year>
          , 13th International Conference on Post-Quantum Cryptography, virtual, DC, US,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Smith-Tone</surname>
          </string-name>
          ,
          <article-title>New practical multivariate signatures from a nonlinear modifier, IACR e-print archive</article-title>
          ,
          <year>2021</year>
          /419.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Smith-Tone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
             
            <surname>Tone</surname>
          </string-name>
          ,
          <article-title>A nonlinear multivariate cryptosystem based on a random linear code</article-title>
          . URL: https://eprint.iacr.org/
          <year>2019</year>
          /1355
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>D.</surname>
          </string-name>
           Jayashree,
          <string-name>
            <surname>R.</surname>
          </string-name>
           Dutta,
          <article-title>Progress in multivariate cryptography: systematic review, challenges, and research directions</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>55</volume>
          (
          <issue>12</issue>
          (
          <issue>246</issue>
          )) (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>34</lpage>
          . doi:
          <volume>10</volume>
          .1145/3571071
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
             
            <surname>Cabarcas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Cabarcas</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
           Baena,
          <article-title>Efficient public-key operation in multivariate schemes</article-title>
          ,
          <source>Adv. Math. Commun</source>
          .
          <volume>13</volume>
          (
          <issue>2</issue>
          ) (
          <year>2019</year>
          )
          <fpage>343</fpage>
          -
          <lpage>371</lpage>
          . doi:
          <volume>10</volume>
          .3934/amc.2019023
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R. </given-names>
            <surname>Cartor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Smith-Tone</surname>
          </string-name>
          ,
          <article-title>EFLASH: A new multivariate encryption scheme</article-title>
          , in: International Conference on Selected Areas in Cryptography,
          <year>2018</year>
          ,
          <fpage>281</fpage>
          -
          <lpage>299</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Casanova</surname>
          </string-name>
          , et al.,
          <article-title>Gemss: A great multivariate short signature</article-title>
          ,
          <source>Submission to NIST</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>J. Chen</surname>
          </string-name>
          , et al.,
          <article-title>A new encryption scheme for multivariate quadratic systems</article-title>
          ,
          <source>Theor. Comput. Sci</source>
          .
          <volume>809</volume>
          (
          <year>2020</year>
          )
          <fpage>372</fpage>
          -
          <lpage>383</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>M.-S. Chen</surname>
          </string-name>
          , et al.,
          <article-title>SOFIA: MQ-based signatures in the QROM</article-title>
          , in: IACR International Workshop on Public Key Cryptography,
          <year>2018</year>
          ,
          <fpage>3</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>D. H. Duong</surname>
          </string-name>
          , et al.,
          <article-title>An efficient multivariate threshold ring signature scheme</article-title>
          ,
          <source>Comput. Stand. Interfaces</source>
          <volume>74</volume>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1016/j.csi.
          <year>2020</year>
          .103489
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>J.-C.</surname>
          </string-name>
           
          <string-name>
            <surname>Faugere</surname>
          </string-name>
          , et al.,
          <article-title>A new perturbation for multivariate public key schemes such as HFE and UOV</article-title>
          ,
          <source>Cryptology ePrint Archive</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>W.</surname>
          </string-name>
           Buellens,
          <article-title>Improved cryptanalysis of UOV and rainbow improved cryptanalysis of UOV and rainbow</article-title>
          , in: Advances in Cryptology,
          <source>EUROCRYPT 2021, Lecture Notes in Computer Science</source>
          , vol.
          <volume>12696</volume>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15] 12th International Workshop,
          <source>PQCrypto 2021, Lecture Notes in Computer Science</source>
          , vol.
          <volume>12841</volume>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <article-title>Post quantum cryptography</article-title>
          , in: 13th International Workshop, PQCrypt 2022,
          <string-name>
            <given-names>Virtual</given-names>
            <surname>Event</surname>
          </string-name>
          ,
          <source>September 28-30</source>
          ,
          <year>2022</year>
          , Proceeding, Lecture Notes in Computer Science (LNCS, volume
          <volume>13512</volume>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <article-title>Post-quantum cryptography</article-title>
          ,
          <source>in: 14th International Workshop, PQCrypto 2023, Lecture Notes in Computer Science</source>
          , vol.
          <volume>14154</volume>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <article-title>Post-quantum cryptography</article-title>
          ,
          <source>in: 15th International Workshop, PQCrypto 2024, Part 2, Lecture Notes in Computer Science</source>
          , vol.
          <volume>14772</volume>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19] N. 
          <string-name>
            <surname>Koblitz</surname>
          </string-name>
          , Algebraic aspects of cryptography, Springer,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Ustimenko, Maximality of affine group, hidden graph cryptosystem and graph's stream ciphers</article-title>
          ,
          <source>J. Algebr. Discret. Math. 1</source>
          (
          <year>2005</year>
          )
          <fpage>51</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Ustimenko, Linguistic Dynamical systems, graphs of large girth and cryptography</article-title>
          ,
          <source>J. Math. Sci</source>
          .
          <volume>140</volume>
          (
          <issue>3</issue>
          ) (
          <year>2007</year>
          )
          <fpage>412</fpage>
          -
          <lpage>434</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Ustimenko, Graphs in terms of algebraic geometry, symbolic computations and secure communications in post-quantum world</article-title>
          ,
          <source>UMCS Editorial House</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Shpilrain</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Ushakov, The conjugacy search problem in public key cryptography: unnecessary and insufficient</article-title>
          , in: Applicable Algebra in Engineering,
          <source>Communication and Computing</source>
          , vol.
          <volume>17</volume>
          (
          <issue>3-4</issue>
          ),
          <year>2006</year>
          ,
          <fpage>285</fpage>
          -
          <lpage>289</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Kahrobaei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Khan</surname>
          </string-name>
          ,
          <article-title>A non-commutative generalization of ElGamal key exchange using polycyclic groups</article-title>
          ,
          <source>in: IEEE GLOBECOM</source>
          <year>2006</year>
          , Global Telecommunications Conference,
          <year>2006</year>
          . doi:
          <volume>10</volume>
          .1109/GLOCOM.2006
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Myasnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Shpilrain</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           Ushakov, Group-based cryptography, Berlin, Birkhäuser Verlag,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>Z.</given-names>
             
            <surname>Cao</surname>
          </string-name>
          , New Directions of modern cryptography, Boca Raton: CRC Press, Taylor &amp; Francis Group,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Fine</surname>
          </string-name>
          , et al.
          <article-title>Aspects of non abelian group based cryptography: A survey and open problems</article-title>
          , arXiv.
          <source>doi:10.48550/arXiv.1103.4093</source>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>A. G.</given-names>
            <surname> Myasnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Shpilrain</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Ushakov, Non-commutative cryptography and complexity of group-theoretic problems</article-title>
          ,
          <source>American Mathematical Society</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [50]
          <string-name>
            <surname>I.</surname>
          </string-name>
           Anshel,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Anshel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Goldfeld</surname>
          </string-name>
          ,
          <article-title>An algebraic method for public-key cryptography</article-title>
          .
          <source>Math. Res. Lett</source>
          .
          <volume>6</volume>
          (
          <issue>3</issue>
          -4) (
          <year>1999</year>
          )
          <fpage>287</fpage>
          -
          <lpage>291</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [51]
          <string-name>
            <surname>S.</surname>
          </string-name>
           R. Blackburn, S. D. Galbraith,
          <article-title>Cryptanalysis of two cryptosystems based on group actions</article-title>
          ,
          <source>in: Advances in Cryptology, ASIACRYPT'99, Lecture Notes in Computer Science</source>
          , vol.
          <volume>1716</volume>
          ,
          <year>1999</year>
          ,
          <fpage>52</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [52]
          <string-name>
            <surname>K. H. Ko</surname>
          </string-name>
          , et al,
          <article-title>New public-key cryptosystem using braid groups</article-title>
          ,
          <source>in: Advances in CryptologyCRYPTO</source>
          <year>2000</year>
          , Santa Barbara,
          <source>CA. Lecture Notes in Computer Science</source>
          , vol.
          <year>1880</year>
          ,
          <year>2000</year>
          ,
          <fpage>166</fpage>
          -
          <lpage>183</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>G.</given-names>
            <surname> Maze</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
             
            <surname>Monico</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
           Rosenthal,
          <article-title>Public key cryptography based on semigroup actions</article-title>
          ,
          <source>Adv. Math. Commun</source>
          .
          <volume>1</volume>
          (
          <issue>4</issue>
          ) (
          <year>2007</year>
          )
          <fpage>489</fpage>
          -
          <lpage>507</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [54]
          <string-name>
            <surname>P. H. Kropholler</surname>
          </string-name>
          , et al.,
          <article-title>Properties of certain semigroups and their potential as platforms for cryptosystems</article-title>
          ,
          <source>Semigroup Forum</source>
          <volume>81</volume>
          (
          <year>2010</year>
          )
          <fpage>172</fpage>
          -
          <lpage>186</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [55]
          <string-name>
            <surname>J. A.</surname>
          </string-name>
           Lopez Ramos, et al.,
          <source>Group key management based on semigroup actions, J. Algebra Appl</source>
          .
          <volume>16</volume>
          (
          <issue>08</issue>
          ) (
          <year>2017</year>
          )
          <fpage>1750148</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [56]
          <string-name>
            <given-names>G.</given-names>
            <surname> Kumar</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
           
          <article-title>Saini, Novel noncommutative cryptography scheme using extra special group</article-title>
          ,
          <source>Secur. Commun. Netw</source>
          .
          <year>2017</year>
          (
          <article-title>1) (</article-title>
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1155/
          <year>2017</year>
          /9036382
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [57]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Myasnikov</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Roman'kov, A linear decomposition attack</article-title>
          ,
          <source>Groups Complex. Cryptol</source>
          .
          <volume>7</volume>
          (
          <year>2015</year>
          )
          <fpage>81</fpage>
          -
          <lpage>94</lpage>
          . doi:
          <volume>10</volume>
          .1515/gcc-2015-0007.
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [58]
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Roman'kov, A nonlinear decomposition attack</article-title>
          ,
          <source>Groups Complex. Cryptol</source>
          .
          <volume>8</volume>
          (
          <issue>2</issue>
          ) (
          <year>2017</year>
          )
          <fpage>197</fpage>
          -
          <lpage>207</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [59]
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Roman'kov, Two general schemes of algebraic cryptography</article-title>
          ,
          <source>Groups Complex. Cryptol</source>
          .
          <volume>10</volume>
          (
          <issue>2</issue>
          ) (
          <year>2018</year>
          )
          <fpage>83</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [60]
          <string-name>
            <given-names>V.</given-names>
            <surname>Roman</surname>
          </string-name>
          <article-title>'kov, An improved version of the AAG cryptographic protocol</article-title>
          ,
          <source>Groups Complex. Cryptol</source>
          .
          <volume>11</volume>
          (
          <issue>1</issue>
          ) (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1515/gcc-2019
          <string-name>
            <surname>-</surname>
          </string-name>
          <fpage>2003</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [61]
          <string-name>
            <given-names>B.</given-names>
            <surname>Tsaban</surname>
          </string-name>
          ,
          <article-title>Polynomial time solutions of computational problems in noncommutative algebraic cryptography</article-title>
          ,
          <source>J. Cryptol</source>
          .
          <volume>28</volume>
          (
          <issue>3</issue>
          ) (
          <year>2015</year>
          )
          <fpage>601</fpage>
          -
          <lpage>622</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [62]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Ben-Zvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Kalka</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
           
          <article-title>Tsaban, Cryptanalysis via algebraic spans</article-title>
          ,
          <source>in: Advances in Cryptology - CRYPTO 2018, Lecture Notes in Computer Science</source>
          , vol.
          <volume>10991</volume>
          ,
          <year>2018</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>