A new perturbation algorithm and enhancing security of SFLASH signature scheme

被引:0
|
作者
WANG HouZhen1
2School of Computer
3Chinese Electronic Equipment System Corporation
机构
基金
中国国家自然科学基金;
关键词
SFLASH; differential cryptanalysis; noise factor; noise operation; noise group;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
This paper introduces the concept of noise factor and noise operation, and constructs a noise group. We present a new perturbation algorithm for enhancing security of multivariate public key cryptosystems (MPKCs). European Consortium SFLASH which derives from Matsumoto-Imai scheme is a fast signature scheme intended for low cost smart cards. It was broken with the differential cryptanalysis by Dubois et al. in 2007. Taking Matsumoto-Imai system as an example, security analysis shows that the new algorithm can powerfully demolish its potential mathematical properties of the public key, and effectively avoid differential cryptanalysis without lowering the effciency of the original algorithm.
引用
收藏
页码:760 / 768
页数:9
相关论文
共 50 条
  • [21] New (t,n) threshold directed signature scheme with provable security
    Lu, Rongxing
    Lin, Xiaodong
    Cao, Zhenfu
    Shao, Jun
    Liang, Xiaohui
    INFORMATION SCIENCES, 2008, 178 (03) : 756 - 765
  • [22] On the security of a convertible group signature scheme
    Saeednia, S
    INFORMATION PROCESSING LETTERS, 2000, 73 (3-4) : 93 - 96
  • [23] On the Security of the Digital Signature Algorithm
    Ian F. Blake
    Theodoulos Garefalakis
    Designs, Codes and Cryptography, 2002, 26 : 87 - 96
  • [24] Verified Security of BLT Signature Scheme
    Firsov, Denis
    Buldas, Ahto
    Truu, Ahto
    Laanoja, Risto
    CPP '20: PROCEEDINGS OF THE 9TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS, 2020, : 244 - 257
  • [25] On the security of digital signature algorithm
    Liu, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 362 - 367
  • [26] SECURITY OF XINMEI DIGITAL SIGNATURE SCHEME
    ALABBADI, M
    WICKER, SB
    ELECTRONICS LETTERS, 1992, 28 (09) : 890 - 891
  • [27] The security flaw of an untraceable signature scheme
    Chang, CC
    Chang, YF
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1379 - 1381
  • [28] A Forward Security Digital Signature Scheme
    Zhao Lijiang
    Liu Yali
    2011 INTERNATIONAL CONFERENCE ON AEROSPACE ENGINEERING AND INFORMATION TECHNOLOGY (AEIT 2011), 2011, : 208 - 211
  • [29] Security of proxy blind signature scheme
    Zhang, Jianhong
    Cui, Yuanbo
    Chen, Zhipeng
    Information Technology Journal, 2013, 12 (03) : 466 - 469
  • [30] On the Security of a Certificateless Short Signature Scheme
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Tan, Syh-Yuan
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2015, 9 : 103 - 113