Abstract
Yasuda, Takagi and Sakurai proposed a new signature scheme in PQCrypto 2013 using quadratic forms over finited fields of odd characteristic. Later on two independent attacks were proposed by Hashimoto in PQCrypto 2014 and by Zhang and Tan in ICISC 2014 to break their scheme. The purpose of this paper is to fix the security problem of Yasuda, Takagi and Sakurai’s scheme. We achieve this purpose by mixing their scheme with a special type HFEv polynomials to produce a new scheme, YTS-HFEv. We analyze its security and propose a practical parameter set with public key size about 57 KB and security level \(2^{80}\).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bettale, L., Faugère, J.C., Perret, L.: Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic. Des. Codes Crypt. 69(1), 1–52 (2013)
Clough, C.: Square: A New Family of Multivariate Encryption Schemes. Ph.D. thesis, University of Cincinnati (2009)
Coppersmith, D., Stern, J., Vaudenay, S.: The security of the birational permutation signature schemes. J. Crypt. 10, 207–221 (1997)
Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. Advances in Information Security, vol. 25. Springer, Heidelberg (2006)
Ding, J., Schmidt, D.: Cryptanalysis of HFEv and internal perturbation of HFE. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 288–301. Springer, Heidelberg (2005)
Ding, J., Wolf, C., Yang, B.-Y.: \(\ell \)-invertible cycles for multivariate quadratic (MQ) public key cryptography. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 266–281. Springer, Heidelberg (2007)
Ding, J., Yang, B.-Y.: Degree of regularity for HFEv and HFEv-. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 52–66. Springer, Heidelberg (2013)
Faugère, J.-C., Joux, A.: Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gröbner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44–60. Springer, Heidelberg (2003)
Goubin, L., Courtois, N.T.: Cryptanalysis of the TTM cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 44–57. Springer, Heidelberg (2000)
Garey, M.R., Johnson, D.S.: Computers and intractability: A guide to the theory of NP-completeness. W.H. Freeman, New York (1979)
Granboulan, L., Joux, A., Stern, J.: Inverting HFE is quasipolynomial. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 345–356. Springer, Heidelberg (2006)
Hashimoto, Y.: Cryptanalysis of the multivariate signature scheme proposed in PQCrypto 2013. In: Mosca, M. (ed.) PQCrypto 2014. LNCS, vol. 8772, pp. 108–125. Springer, Heidelberg (2014)
Kipnis, A., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206–222. Springer, Heidelberg (1999)
Kipnis, A., Shamir, A.: Cryptanalysis of the oil and vinegar signature scheme. In: Krawczyk, H. (ed.) Advances in Cryptology – CRYPTO’98. LNCS, vol. 1462, pp. 257–266. Springer, Heidelberg (1998)
Kipnis, A., Shamir, A.: Cryptanalysis of the HFE public key cryptosystem by relinearization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 19–30. Springer, Heidelberg (1999)
Lidl, R., Niederreiter, H.: Finite fields. Encyclopedia of Mathematics and Its Applications, vol. 20, 2nd edn. Cambridge University Press, Cambridge (1997)
Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419–453. Springer, Heidelberg (1988)
Patarin, J.: Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt’88. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 248–261. Springer, Heidelberg (1995)
Patarin, J.: Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33–48. Springer, Heidelberg (1996)
Porras, J., Baena, J., Ding, J.: ZHFE, a new multivariate public key encryption scheme. In: Mosca, M. (ed.) PQCrypto 2014. LNCS, vol. 8772, pp. 229–245. Springer, Heidelberg (2014)
Patarin, J., Courtois, N.T., Goubin, L.: QUARTZ, 128-bit long digital signatures. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 282–288. Springer, Heidelberg (2001)
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)
Taylor, D.E.: The Geometry of the Classical Groups. Sigma Series in Pure Mathematics. Heldermann Verlag, Berlin (1992)
Tao, C., Diene, A., Tang, S., Ding, J.: Simple matrix scheme for encryption. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 231–242. Springer, Heidelberg (2013)
Wolf, C., Braeken, A., Preneel, B.: Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 294–309. Springer, Heidelberg (2005)
Wolf, C., Braeken, A., Preneel, B.: On the security of stepwise triangular systems. Des. Codes Crypt. 40, 285–302 (2006)
Wolf, C, Preneel, B.: Taxonomy of public key schemes based on the problem of multivariatequadratic equations. Cryptology ePrint Archive, Report 2005/077 (2005). http://eprint.iacr.org/2005/077/
Wang, L.-C., Yang, B.-Y., Hu, Y.-H., Lai, F.: A “medium-field” multivariate public-key encryption scheme. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 132–149. Springer, Heidelberg (2006)
Yang, B.-Y., Chen, J.-M.: Building secure tame-like multivariate public-key cryptosystems: the new TTS. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 518–531. Springer, Heidelberg (2005)
Yasuda, T., Takagi, T., Sakurai, K.: Multivariate signature scheme using quadratic forms. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 243–258. Springer, Heidelberg (2013)
Zhang, W., Tan, C.H.: Algebraic cryptanalysis of Yasuda, Takagi and Sakurai’s signature scheme. In: Lee, J., Kim, J. (eds.) Information Security and Cryptology - ICISC 2014. LNCS, vol. 8949, pp. 53–66. Springer, Switzerland (2014)
Zhang, W., Tan, C.H.: Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme Using Invariant Subspaces. Cryptology ePrint Archive, Report 2015/1005 (2015). http://eprint.iacr.org/2015/1005
Zhang, W., Tan, C.H.: MI-T-HFE, a new multivariate signature scheme. In: Groth, J. (ed.) IMACC 2015. LNCS, vol. 9496, pp. 43–56. Springer, Heidelberg (2015). doi:10.1007/978-3-319-27239-9_3
Acknowledgments
The authors would like to thank the anonymous reviewers for their helpful comments on improving this paper. The first author would like to thank the financial support from the National Natural Science Foundation of China (Grant No. 61572189).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhang, W., Tan, C.H. (2016). A Secure Variant of Yasuda, Takagi and Sakurai’s Signature Scheme. In: Lin, D., Wang, X., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2015. Lecture Notes in Computer Science(), vol 9589. Springer, Cham. https://doi.org/10.1007/978-3-319-38898-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-38898-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38897-7
Online ISBN: 978-3-319-38898-4
eBook Packages: Computer ScienceComputer Science (R0)