Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme

被引:0
|
作者
Nie, Xuyun [1 ,2 ,3 ,4 ]
Xu, Zhaohu [1 ,3 ]
Buchmann, Johannes [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Tech Univ Darmstadt, Dept Comp Sci, D-64289 Darmstadt, Germany
[3] Network & Data Secur Key Lab, Chengdu, Sichuan, Peoples R China
[4] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Multivariate public key cryptosystem; Minus method; Algebraic attack; Hash-based tamed transformation; PUBLIC-KEY CRYPTOSYSTEMS; MULTIVARIATE; ALGORITHMS; MATSUMOTO; EQUATIONS; HFE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2011, wang et al. proposed a security enhancement method of Multivariate Public Key Cryptosystems (MPKCs), named Extended Multivariate public key Cryptosystems (EMC). They introduced more variables in an original MPKC by a so-called Hash-based Tamed (HT) transformation in order to resist existing attack on the original MPKC. They proposed Hash-based Tamed Transformation and Minus (HTTM) signature scheme which combined EMC method with minus method. Through our analysis, the HTTM is not secure as they declared. If we can forge a valid signature of the original MPKC-minus signature scheme, we could forge a valid signature of HTTM scheme successfully.
引用
收藏
页码:155 / 164
页数:10
相关论文
共 50 条
  • [31] Hash-based encryption system
    Peyravian, M
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 1999, 18 (04) : 345 - 350
  • [32] Shorter hash-based signatures
    Pereira, Geovandro C. C. F.
    Puodzius, Cassius
    Barreto, Paulo S. L. M.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 95 - 100
  • [33] Hash-based IP traceback
    Snoeren, AC
    Partridge, C
    Sanchez, LA
    Jones, CE
    Tchakountio, F
    Kent, ST
    Strayer, WT
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) : 3 - 14
  • [34] Cryptanalysis of the SHMW signature scheme
    Lau, Terry Shue Chien
    Ariffin, Muhammad Rezal Kamel
    Yip, Sook-Chin
    Chin, Ji-Jian
    Ting, Choo-Yee
    HELIYON, 2024, 10 (02)
  • [35] Cryptanalysis of the SFLASH signature scheme
    Dubois, Vivien
    Fouque, Pierre-Alain
    Shamir, Adi
    Stern, Jacques
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 1 - 4
  • [36] Cryptanalysis of the SNOVA Signature Scheme
    Li, Peigen
    Ding, Jintai
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 79 - 91
  • [37] Cryptanalysis of threshold proxy signature scheme based on factoring
    Liu Feng
    Gao Dong-Mei
    Cui Guang-Hai
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 473 - +
  • [38] Cryptanalysis of the PEREGRINE Lattice-Based Signature Scheme
    Lin, Xiuhan
    Suzuki, Moeto
    Zhang, Shiduo
    Espitau, Thomas
    Yu, Yang
    Tibouchi, Mehdi
    Abe, Masayuki
    PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 387 - 412
  • [39] Cryptanalysis of a blind signature scheme based on the ELGamal signatures
    School of Management, Hefei University of Technology, Hefei 230009, China
    Zhongshan Daxue Xuebao, 2006, SUPPL. (38-40):
  • [40] Cryptanalysis of Smart Card and Biometric-Hash based Authentication Scheme
    Panwar, Narendra
    Rauthan, Manmohan Singh
    Agarwal, Amit
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 831 - 834