Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme

被引:0
|
作者
Nie, Xuyun [1 ,2 ,3 ,4 ]
Xu, Zhaohu [1 ,3 ]
Buchmann, Johannes [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Tech Univ Darmstadt, Dept Comp Sci, D-64289 Darmstadt, Germany
[3] Network & Data Secur Key Lab, Chengdu, Sichuan, Peoples R China
[4] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Multivariate public key cryptosystem; Minus method; Algebraic attack; Hash-based tamed transformation; PUBLIC-KEY CRYPTOSYSTEMS; MULTIVARIATE; ALGORITHMS; MATSUMOTO; EQUATIONS; HFE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2011, wang et al. proposed a security enhancement method of Multivariate Public Key Cryptosystems (MPKCs), named Extended Multivariate public key Cryptosystems (EMC). They introduced more variables in an original MPKC by a so-called Hash-based Tamed (HT) transformation in order to resist existing attack on the original MPKC. They proposed Hash-based Tamed Transformation and Minus (HTTM) signature scheme which combined EMC method with minus method. Through our analysis, the HTTM is not secure as they declared. If we can forge a valid signature of the original MPKC-minus signature scheme, we could forge a valid signature of HTTM scheme successfully.
引用
收藏
页码:155 / 164
页数:10
相关论文
共 50 条
  • [41] Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
    Safkhani, Masoumeh
    Pens-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Bagheri, Nasour
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 571 - 577
  • [42] A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme
    Kim, Minho
    Koc, Cetin Kaya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 157 - 160
  • [43] Analysis and Improvement on a Hash-Based Authentication Scheme for Multi-Server Architecture
    LI Rui
    KANG Baoyuan
    MAI Kaiqiang
    Wuhan University Journal of Natural Sciences, 2021, 26 (05) : 394 - 404
  • [44] Cryptanalysis and improvement on a digital signature scheme without using one-way hash and message redundancy
    Liu, Jie
    Li, Jianhua
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 266 - 269
  • [45] A hash-based image encryption algorithm
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    McKevitt, Paul
    OPTICS COMMUNICATIONS, 2010, 283 (06) : 879 - 893
  • [46] Improving Stateless Hash-Based Signatures
    Aumasson, Jean-Philippe
    Endignoux, Guillaume
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 219 - 242
  • [47] Hash-based signatures for the Internet of Things
    Palmieri, Paolo
    2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 332 - 335
  • [48] HASH-BASED ALGORITHMS FOR DISCRETIZED DATA
    Robey, Rachel N.
    Nicholaeff, David
    Robey, Robert W.
    SIAM JOURNAL ON SCIENTIFIC COMPUTING, 2013, 35 (04): : C346 - C368
  • [49] State Management for Hash-Based Signatures
    McGrew, David
    Kampanakis, Panos
    Fluhrer, Scott
    Gazdag, Stefan-Lukas
    Butin, Denis
    Buchmann, Johannes
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 244 - 260
  • [50] Cryptanalysis of an identity based proxy multi-signature scheme
    Li, Fagen
    Zhou, Shijie
    Sun, Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1820 - 1823