Skip to main content

Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme

  • Conference paper
  • First Online:
Information Security and Cryptology - ICISC 2014 (ICISC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8949))

Included in the following conference series:

  • 809 Accesses

Abstract

Recently Yasuda, Takagi and Sakurai proposed a new and interesting signature scheme from the classification of quadratic forms over finite fields of odd characteristic published in PQCrypto 2013. In this paper we propose two algebraic attacks to their scheme using only linear algebra. Both attacks are motivated by Kipnis and Shamir’s attack to the oil-vinegar signature scheme. Namely we first turn the original problem to a geometric problem and then apply the theory of invariant subspace intensively. We show that Yasuda, Takagi and Sakurai’s scheme can be broken by our attacks with complexity \(O(m^{\frac{11}{2}}q^d)\) where \(m\) is the number of variables and \(q\) is the size of the base field. Here \(d\) is expected generally to be 1 and is confirmed in our tests. We also compare our attacks with Y. Hashimoto’s attack which is just published in PQCrypto 2014.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Berlekamp, E.R.: Factoring polynomials over finite fields. Bell Syst. Tech. J. 46, 1853–1859 (1967)

    Article  MathSciNet  Google Scholar 

  2. Berlekamp, E.R.: Factoring polynomials over large finite fields. Math. Comput. 24, 713–735 (1970)

    Article  MathSciNet  Google Scholar 

  3. Cao, W., Hu, L., Ding, J., Yin, Z.: Kipnis-Shamir attack on unbalanced oil-vinegar scheme. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 168–180. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  4. Clark, P.L.: Linear algebra: Invariant subspaces. http://math.uga.edu/~pete/invariant_subspaces.pdf

  5. Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. Advances in Information Security, vol. 25. Springer, Heidelberg (2006)

    MATH  Google Scholar 

  6. Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164–175. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Ding, J., Yang, B.-Y.: Multivariate public key cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 193–241. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  8. Geiselmann, W., Steinwandt, R.: A short comment on the affine parts of SFLASH\(^{v3}\). Cryptology ePrint Archive, Report 2003/220 (2003). http://eprint.iacr.org/

  9. Geiselmann, W., Steinwandt, R., Beth, T.: Attacking the affine parts of SFLASH. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 355–359. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Hashimoto, Y.: Cryptanalysis of the multivariate signature scheme proposed in PQCrypto 2013. In: Mosca, M. (ed.) PQCrypto 2014. LNCS, vol. 8772, pp. 108–125. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  11. Kipnis, A., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206–222. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  12. Kipnis, A., Shamir, A.: Cryptanalysis of the oil and vinegar signature scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 257–267. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  13. Kedlay, K.S., Umans, C.: Fast polynomial factorization and modular composition. SIAM J. Comput. 40(6), 1767–1802 (2011)

    Article  MathSciNet  Google Scholar 

  14. Patarin, J.: The oil and vinegar signature scheme. Presented at the Dagstuhl Workshop on Cryptography, September 1997

    Google Scholar 

  15. Scharlau, W.: Quadratic and Hermitian Forms. Springer, Heidelberg (1985)

    Book  MATH  Google Scholar 

  16. von zur Gathen, J., Panario, D.: Factoring polynomials over finite fields: a survey. J. Symbol. Comput. 31, 3–17 (2001)

    Article  MATH  Google Scholar 

  17. Wolf, C., Preneel, B.: Equivalent keys in HFE, C\(^{*}\), and variations. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 33–49. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  18. Wolf, C., Preneel, B.: Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive, Report 2005/077 (2005). http://eprint.iacr.org/2005/077/

  19. Yasuda, T., Takagi, T., Sakurai, K.: Multivariate signature scheme using quadratic forms. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 243–258. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

Download references

Acknowledgment

The authors would like to thank the anonymous reviewers for their helpful comments on improving this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenbin Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang, W., Tan, C.H. (2015). Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme. In: Lee, J., Kim, J. (eds) Information Security and Cryptology - ICISC 2014. ICISC 2014. Lecture Notes in Computer Science(), vol 8949. Springer, Cham. https://doi.org/10.1007/978-3-319-15943-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15943-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15942-3

  • Online ISBN: 978-3-319-15943-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics