Abstract
Recently Yasuda, Takagi and Sakurai proposed a new and interesting signature scheme from the classification of quadratic forms over finite fields of odd characteristic published in PQCrypto 2013. In this paper we propose two algebraic attacks to their scheme using only linear algebra. Both attacks are motivated by Kipnis and Shamir’s attack to the oil-vinegar signature scheme. Namely we first turn the original problem to a geometric problem and then apply the theory of invariant subspace intensively. We show that Yasuda, Takagi and Sakurai’s scheme can be broken by our attacks with complexity \(O(m^{\frac{11}{2}}q^d)\) where \(m\) is the number of variables and \(q\) is the size of the base field. Here \(d\) is expected generally to be 1 and is confirmed in our tests. We also compare our attacks with Y. Hashimoto’s attack which is just published in PQCrypto 2014.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Berlekamp, E.R.: Factoring polynomials over finite fields. Bell Syst. Tech. J. 46, 1853–1859 (1967)
Berlekamp, E.R.: Factoring polynomials over large finite fields. Math. Comput. 24, 713–735 (1970)
Cao, W., Hu, L., Ding, J., Yin, Z.: Kipnis-Shamir attack on unbalanced oil-vinegar scheme. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 168–180. Springer, Heidelberg (2011)
Clark, P.L.: Linear algebra: Invariant subspaces. http://math.uga.edu/~pete/invariant_subspaces.pdf
Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. Advances in Information Security, vol. 25. Springer, Heidelberg (2006)
Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164–175. Springer, Heidelberg (2005)
Ding, J., Yang, B.-Y.: Multivariate public key cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 193–241. Springer, Heidelberg (2009)
Geiselmann, W., Steinwandt, R.: A short comment on the affine parts of SFLASH\(^{v3}\). Cryptology ePrint Archive, Report 2003/220 (2003). http://eprint.iacr.org/
Geiselmann, W., Steinwandt, R., Beth, T.: Attacking the affine parts of SFLASH. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 355–359. Springer, Heidelberg (2001)
Hashimoto, Y.: Cryptanalysis of the multivariate signature scheme proposed in PQCrypto 2013. In: Mosca, M. (ed.) PQCrypto 2014. LNCS, vol. 8772, pp. 108–125. Springer, Heidelberg (2014)
Kipnis, A., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206–222. Springer, Heidelberg (1999)
Kipnis, A., Shamir, A.: Cryptanalysis of the oil and vinegar signature scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 257–267. Springer, Heidelberg (1998)
Kedlay, K.S., Umans, C.: Fast polynomial factorization and modular composition. SIAM J. Comput. 40(6), 1767–1802 (2011)
Patarin, J.: The oil and vinegar signature scheme. Presented at the Dagstuhl Workshop on Cryptography, September 1997
Scharlau, W.: Quadratic and Hermitian Forms. Springer, Heidelberg (1985)
von zur Gathen, J., Panario, D.: Factoring polynomials over finite fields: a survey. J. Symbol. Comput. 31, 3–17 (2001)
Wolf, C., Preneel, B.: Equivalent keys in HFE, C\(^{*}\), and variations. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 33–49. Springer, Heidelberg (2005)
Wolf, C., Preneel, B.: Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive, Report 2005/077 (2005). http://eprint.iacr.org/2005/077/
Yasuda, T., Takagi, T., Sakurai, K.: Multivariate signature scheme using quadratic forms. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 243–258. Springer, Heidelberg (2013)
Acknowledgment
The authors would like to thank the anonymous reviewers for their helpful comments on improving this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhang, W., Tan, C.H. (2015). Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme. In: Lee, J., Kim, J. (eds) Information Security and Cryptology - ICISC 2014. ICISC 2014. Lecture Notes in Computer Science(), vol 8949. Springer, Cham. https://doi.org/10.1007/978-3-319-15943-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-15943-0_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15942-3
Online ISBN: 978-3-319-15943-0
eBook Packages: Computer ScienceComputer Science (R0)