Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems

被引:0
|
作者
Petzoldt, Albrecht [1 ]
Thomae, Enrico [2 ]
Bulygin, Stanislav [1 ]
Wolf, Christopher [2 ]
机构
[1] Tech Univ Darmstadt, Ctr Adv Security Res Dramstadt CASED, D-44780 Bochum, Germany
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Security, Fac Math, D-44780 Bochum, Germany
关键词
Multivariate Quadratic Cryptography; Post-Quantum Cryptography; Implementation; Unbalanced Oil and Vinegar Signature Scheme; PKCS; TTS; OIL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security of public key schemes in a post-quantum world is a challenging task-as both RSA and ECC will be broken then. In this paper, we show how post-quantum signature systems based on Multivariate Quadratic (MQ) polynomials can be improved up by about 9/10, and 3/5, respectively, in terms of public key size and verification time. The exact figures are 88% and 59%. This is particularly important for small-scale devices with restricted energy, memory, or computational power. In addition, we provide evidence that this reduction does not affect security and that it is also optimal in terms of possible attacks. We do so by combining the previously unrelated concepts of reduced and equivalent keys. Our new scheme is based on the so-called Unbalanced Oil and Vinegar class of MQ-schemes. We have derived our results mathematically and verified the speed-ups through a C++ implementation.
引用
收藏
页码:475 / +
页数:3
相关论文
共 50 条
  • [21] Fast verification and public key storage optimization for unstructured lattice-based signatures
    Bajard, Jean-Claude
    Fukushima, Kazuhide
    Plantard, Thomas
    Sipasseuth, Arnaud
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (03) : 373 - 388
  • [22] Cryptanalysis of Rational Multivariate Public Key Cryptosystems
    Ding, Jintai
    Wagner, John
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 124 - 136
  • [23] On the Differential Security of Multivariate Public Key Cryptosystems
    Smith-Tone, Daniel
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 130 - 142
  • [24] An image authentication and verification based on public key
    Li Lizong
    Gao Tiegang
    Gu Qiaolun
    Bi Lei
    2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL II, PROCEEDINGS, 2009, : 389 - +
  • [25] A public key watermark for image verification and authentication
    Wong, PW
    1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, 1998, : 455 - 459
  • [26] Some weak keys in McEliece public-key cryptosystem
    Loidreau, P
    Sendrier, N
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 382 - 382
  • [27] PUBLIC-KEY SYSTEMS
    BRASSARD, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 325 : 20 - 39
  • [28] An applications of signed quadratic residues in public key cryptography
    Goswami, Pinkimani
    Singh, Madan Mohan
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2018, 10 (06)
  • [29] Public key identification based on the equivalence of quadratic forms
    Hartung, Rupert J.
    Schnorr, Claus-Peter
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2007, PROCEEDINGS, 2007, 4708 : 333 - +
  • [30] Quadratic compact knapsack public-key cryptosystem
    Wang, Baocang
    Hu, Yupu
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 59 (01) : 194 - 206