Skip to main content

A Secure Variant of Yasuda, Takagi and Sakurai’s Signature Scheme

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9589))

Included in the following conference series:

  • 796 Accesses

Abstract

Yasuda, Takagi and Sakurai proposed a new signature scheme in PQCrypto 2013 using quadratic forms over finited fields of odd characteristic. Later on two independent attacks were proposed by Hashimoto in PQCrypto 2014 and by Zhang and Tan in ICISC 2014 to break their scheme. The purpose of this paper is to fix the security problem of Yasuda, Takagi and Sakurai’s scheme. We achieve this purpose by mixing their scheme with a special type HFEv polynomials to produce a new scheme, YTS-HFEv. We analyze its security and propose a practical parameter set with public key size about 57 KB and security level \(2^{80}\).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bettale, L., Faugère, J.C., Perret, L.: Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic. Des. Codes Crypt. 69(1), 1–52 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  2. Clough, C.: Square: A New Family of Multivariate Encryption Schemes. Ph.D. thesis, University of Cincinnati (2009)

    Google Scholar 

  3. Coppersmith, D., Stern, J., Vaudenay, S.: The security of the birational permutation signature schemes. J. Crypt. 10, 207–221 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  4. Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. Advances in Information Security, vol. 25. Springer, Heidelberg (2006)

    MATH  Google Scholar 

  5. Ding, J., Schmidt, D.: Cryptanalysis of HFEv and internal perturbation of HFE. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 288–301. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Ding, J., Wolf, C., Yang, B.-Y.: \(\ell \)-invertible cycles for multivariate quadratic (MQ) public key cryptography. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 266–281. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Ding, J., Yang, B.-Y.: Degree of regularity for HFEv and HFEv-. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 52–66. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  8. Faugère, J.-C., Joux, A.: Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gröbner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44–60. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Goubin, L., Courtois, N.T.: Cryptanalysis of the TTM cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 44–57. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  10. Garey, M.R., Johnson, D.S.: Computers and intractability: A guide to the theory of NP-completeness. W.H. Freeman, New York (1979)

    MATH  Google Scholar 

  11. Granboulan, L., Joux, A., Stern, J.: Inverting HFE is quasipolynomial. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 345–356. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Hashimoto, Y.: Cryptanalysis of the multivariate signature scheme proposed in PQCrypto 2013. In: Mosca, M. (ed.) PQCrypto 2014. LNCS, vol. 8772, pp. 108–125. Springer, Heidelberg (2014)

    Google Scholar 

  13. Kipnis, A., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206–222. Springer, Heidelberg (1999)

    Google Scholar 

  14. Kipnis, A., Shamir, A.: Cryptanalysis of the oil and vinegar signature scheme. In: Krawczyk, H. (ed.) Advances in Cryptology – CRYPTO’98. LNCS, vol. 1462, pp. 257–266. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  15. Kipnis, A., Shamir, A.: Cryptanalysis of the HFE public key cryptosystem by relinearization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 19–30. Springer, Heidelberg (1999)

    Google Scholar 

  16. Lidl, R., Niederreiter, H.: Finite fields. Encyclopedia of Mathematics and Its Applications, vol. 20, 2nd edn. Cambridge University Press, Cambridge (1997)

    MATH  Google Scholar 

  17. Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419–453. Springer, Heidelberg (1988)

    Chapter  Google Scholar 

  18. Patarin, J.: Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt’88. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 248–261. Springer, Heidelberg (1995)

    Google Scholar 

  19. Patarin, J.: Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33–48. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  20. Porras, J., Baena, J., Ding, J.: ZHFE, a new multivariate public key encryption scheme. In: Mosca, M. (ed.) PQCrypto 2014. LNCS, vol. 8772, pp. 229–245. Springer, Heidelberg (2014)

    Google Scholar 

  21. Patarin, J., Courtois, N.T., Goubin, L.: QUARTZ, 128-bit long digital signatures. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 282–288. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  22. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  23. Taylor, D.E.: The Geometry of the Classical Groups. Sigma Series in Pure Mathematics. Heldermann Verlag, Berlin (1992)

    MATH  Google Scholar 

  24. Tao, C., Diene, A., Tang, S., Ding, J.: Simple matrix scheme for encryption. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 231–242. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  25. Wolf, C., Braeken, A., Preneel, B.: Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 294–309. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  26. Wolf, C., Braeken, A., Preneel, B.: On the security of stepwise triangular systems. Des. Codes Crypt. 40, 285–302 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  27. Wolf, C, Preneel, B.: Taxonomy of public key schemes based on the problem of multivariatequadratic equations. Cryptology ePrint Archive, Report 2005/077 (2005). http://eprint.iacr.org/2005/077/

  28. Wang, L.-C., Yang, B.-Y., Hu, Y.-H., Lai, F.: A “medium-field” multivariate public-key encryption scheme. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 132–149. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  29. Yang, B.-Y., Chen, J.-M.: Building secure tame-like multivariate public-key cryptosystems: the new TTS. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 518–531. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  30. Yasuda, T., Takagi, T., Sakurai, K.: Multivariate signature scheme using quadratic forms. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 243–258. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  31. Zhang, W., Tan, C.H.: Algebraic cryptanalysis of Yasuda, Takagi and Sakurai’s signature scheme. In: Lee, J., Kim, J. (eds.) Information Security and Cryptology - ICISC 2014. LNCS, vol. 8949, pp. 53–66. Springer, Switzerland (2014)

    Google Scholar 

  32. Zhang, W., Tan, C.H.: Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme Using Invariant Subspaces. Cryptology ePrint Archive, Report 2015/1005 (2015). http://eprint.iacr.org/2015/1005

  33. Zhang, W., Tan, C.H.: MI-T-HFE, a new multivariate signature scheme. In: Groth, J. (ed.) IMACC 2015. LNCS, vol. 9496, pp. 43–56. Springer, Heidelberg (2015). doi:10.1007/978-3-319-27239-9_3

    Chapter  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers for their helpful comments on improving this paper. The first author would like to thank the financial support from the National Natural Science Foundation of China (Grant No. 61572189).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenbin Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang, W., Tan, C.H. (2016). A Secure Variant of Yasuda, Takagi and Sakurai’s Signature Scheme. In: Lin, D., Wang, X., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2015. Lecture Notes in Computer Science(), vol 9589. Springer, Cham. https://doi.org/10.1007/978-3-319-38898-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38898-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38897-7

  • Online ISBN: 978-3-319-38898-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics