Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme

被引:0
|
作者
Nie, Xuyun [1 ,2 ,3 ,4 ]
Xu, Zhaohu [1 ,3 ]
Buchmann, Johannes [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Tech Univ Darmstadt, Dept Comp Sci, D-64289 Darmstadt, Germany
[3] Network & Data Secur Key Lab, Chengdu, Sichuan, Peoples R China
[4] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Multivariate public key cryptosystem; Minus method; Algebraic attack; Hash-based tamed transformation; PUBLIC-KEY CRYPTOSYSTEMS; MULTIVARIATE; ALGORITHMS; MATSUMOTO; EQUATIONS; HFE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2011, wang et al. proposed a security enhancement method of Multivariate Public Key Cryptosystems (MPKCs), named Extended Multivariate public key Cryptosystems (EMC). They introduced more variables in an original MPKC by a so-called Hash-based Tamed (HT) transformation in order to resist existing attack on the original MPKC. They proposed Hash-based Tamed Transformation and Minus (HTTM) signature scheme which combined EMC method with minus method. Through our analysis, the HTTM is not secure as they declared. If we can forge a valid signature of the original MPKC-minus signature scheme, we could forge a valid signature of HTTM scheme successfully.
引用
收藏
页码:155 / 164
页数:10
相关论文
共 50 条
  • [1] Tuning the Winternitz hash-based digital signature scheme
    Perin, Lucas Pandolfo
    Zambonin, Gustavo
    Beppler Martins, Douglas Marcelino
    Custodio, Ricardo
    Martina, Jean Everson
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 542 - 547
  • [2] A Server-Assisted Hash-Based Signature Scheme
    Buldas, Ahto
    Laanoja, Risto
    Truu, Ahto
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 3 - 17
  • [3] A Blockchain-Assisted Hash-Based Signature Scheme
    Buldas, Ahto
    Laanoja, Risto
    Truu, Ahto
    SECURE IT SYSTEMS, 2018, 11252 : 138 - 153
  • [4] Hash-based signature revisited
    Lingyun Li
    Xianhui Lu
    Kunpeng Wang
    Cybersecurity, 5
  • [5] A New Hash-Based Enhanced Privacy ID Signature Scheme
    Chen, Liqun
    Dong, Changyu
    El Kassem, Nada
    Newton, Christopher J. P.
    Wang, Yalan
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT I, 2024, 14771 : 37 - 71
  • [6] BAHS: A Blockchain-Aided Hash-Based Signature Scheme
    Wang, Yalan
    Chen, Liqun
    Meng, Long
    Tian, Yangguang
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 419 - 439
  • [7] A Hash-Based Quantum-Resistant Chameleon Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Cho, Woong
    Joshi, Gyanendra Prasad
    Yang, Eunmok
    SENSORS, 2021, 21 (24)
  • [8] Hash-based signature revisited
    Li, Lingyun
    Lu, Xianhui
    Wang, Kunpeng
    CYBERSECURITY, 2022, 5 (01)
  • [9] A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Park, Chulho
    Joshi, Gyanendra Prasad
    Seo, Changho
    MATHEMATICS, 2022, 10 (10)
  • [10] CRYPTANALYSIS OF AN IMPLEMENTATION SCHEME OF THE TAMED TRANSFORMATION METHOD CRYPTOSYSTEM
    Ding, Jintai
    Hodges, Timothy
    JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2004, 3 (03) : 273 - 282