A new perturbation algorithm and enhancing security of SFLASH signature scheme

被引:0
|
作者
WANG HouZhen1
2School of Computer
3Chinese Electronic Equipment System Corporation
机构
基金
中国国家自然科学基金;
关键词
SFLASH; differential cryptanalysis; noise factor; noise operation; noise group;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
This paper introduces the concept of noise factor and noise operation, and constructs a noise group. We present a new perturbation algorithm for enhancing security of multivariate public key cryptosystems (MPKCs). European Consortium SFLASH which derives from Matsumoto-Imai scheme is a fast signature scheme intended for low cost smart cards. It was broken with the differential cryptanalysis by Dubois et al. in 2007. Taking Matsumoto-Imai system as an example, security analysis shows that the new algorithm can powerfully demolish its potential mathematical properties of the public key, and effectively avoid differential cryptanalysis without lowering the effciency of the original algorithm.
引用
收藏
页码:760 / 768
页数:9
相关论文
共 50 条
  • [31] On the Security of a Certificateless Aggregate Signature Scheme
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (10) : 1136 - 1138
  • [32] On the security of the Digital Signature Algorithm
    Blake, IF
    Garefalakis, T
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 26 (1-3) : 87 - 96
  • [33] Security analysis of a security-enhanced certificateless signature scheme
    Yang, Xiaodong
    Wang, Jinli
    Chen, Chunlin
    Li, Ting
    Wang, Meiding
    Wang, Caifen
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2029 - 2033
  • [34] Enhancing Cloud Security Based On Group Signature
    Sakthivel, Arumugam
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2017, 14 (06) : 923 - 929
  • [35] Security of Analysis Liu's Signature Scheme
    Zhao, Shaoka
    Liu, Chenglian
    2012 INTERNATIONAL CONFERENCE ON FUTURE ELECTRICAL POWER AND ENERGY SYSTEM, PT A, 2012, 17 : 655 - 658
  • [36] Security remarks on a convertible nominative signature scheme
    Wang, Guilin
    Bao, Feng
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 265 - +
  • [37] On the Adaptive Security of the Threshold BLS Signature Scheme
    Bacho, Renas
    Loss, Julian
    PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 193 - 207
  • [38] ON THE SECURITY OF THE WOTS-PRF SIGNATURE SCHEME
    Lafrance, Philip
    Menezes, Alfred
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2019, 13 (01) : 185 - 193
  • [39] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [40] Proofs of Security for Improved Rabin Signature Scheme
    董晓蕾
    陆荣幸
    曹珍富
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 197 - 199