Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems

被引:0
|
作者
Petzoldt, Albrecht [1 ]
Thomae, Enrico [2 ]
Bulygin, Stanislav [1 ]
Wolf, Christopher [2 ]
机构
[1] Tech Univ Darmstadt, Ctr Adv Security Res Dramstadt CASED, D-44780 Bochum, Germany
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Security, Fac Math, D-44780 Bochum, Germany
关键词
Multivariate Quadratic Cryptography; Post-Quantum Cryptography; Implementation; Unbalanced Oil and Vinegar Signature Scheme; PKCS; TTS; OIL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security of public key schemes in a post-quantum world is a challenging task-as both RSA and ECC will be broken then. In this paper, we show how post-quantum signature systems based on Multivariate Quadratic (MQ) polynomials can be improved up by about 9/10, and 3/5, respectively, in terms of public key size and verification time. The exact figures are 88% and 59%. This is particularly important for small-scale devices with restricted energy, memory, or computational power. In addition, we provide evidence that this reduction does not affect security and that it is also optimal in terms of possible attacks. We do so by combining the previously unrelated concepts of reduced and equivalent keys. Our new scheme is based on the so-called Unbalanced Oil and Vinegar class of MQ-schemes. We have derived our results mathematically and verified the speed-ups through a C++ implementation.
引用
收藏
页码:475 / +
页数:3
相关论文
共 50 条
  • [41] The Design of Public Key Cryptography for Key Exchange Base on Multivariate Equations
    Liu Changming
    Zhao Lei
    Sun Yanjun
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 552 - 554
  • [42] Fast Multiplication Techniques for Public Key Cryptography
    Gopal, Vinodh
    Grover, Satyajit
    Kounavis, Michael E.
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 284 - 293
  • [43] A Fast and Secure RSA Public Key Cryptosystem
    Mohammadi, M.
    Zolghadrasli, A.
    Pourmina, M. A.
    JOURNAL OF MATHEMATICAL EXTENSION, 2020, 14 (04) : 1 - 20
  • [44] Completion attacks and weak keys of Oleshchuk's public key cryptosystem
    Stamer, H
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 209 - 220
  • [45] Weak-Keys in Public Key Cryptosystems Based on Discrete Logarithms
    戴瑞恩
    罗平
    彭小宁
    王道顺
    Tsinghua Science and Technology, 2005, (05) : 579 - 581
  • [46] The Million-Key Question - Investigating the Origins of RSA Public Keys
    Svenda, Petr
    Nemec, Matus
    Sekan, Peter
    Kvasnovsky, Rudolf
    Formanek, David
    Komarek, David
    Matyas, Vashek
    PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 893 - 910
  • [47] Cryptanalysis of a quadratic compact knapsack public-key cryptosystem
    Lee, Moon Sung
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 62 (09) : 3614 - 3621
  • [48] A New Public Key Signature Scheme based on Quadratic Polynomials
    Yuan, Feng
    Zhao, Shangwei
    Ou, Haiwen
    Xu, Shengwei
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 8 - 11
  • [49] Public-key security systems
    Univ of New Orleans, New Orleans, United States
    IEEE Micro, 3 (10-13):
  • [50] Public-key security systems
    Abdelguerfi, M
    Kaliski, BS
    Patterson, W
    IEEE MICRO, 1996, 16 (03) : 10 - 13