메뉴 건너뛰기




Volumn 7222 LNCS, Issue , 2012, Pages 184-203

MQQ-SIG: An ultra-fast and provably CMA resistant digital signature scheme

Author keywords

Multivariate Quadratic Polynomials; Multivariate Quadratic Quasigroup; Public Key Cryptography; Quasigroup String Transformations; Ultra Fast Public Key Cryptography

Indexed keywords

DIGITAL SIGNATURE SCHEMES; MULTIVARIATE QUADRATICS; PRIVATE KEY; PUBLIC KEYS; QUADRATIC EQUATIONS; QUADRATIC POLYNOMIAL; QUASIGROUP; QUASIGROUP STRING TRANSFORMATIONS; RANDOM ORACLE MODEL; SIGNATURE SCHEME; SIGNING PROCESS; THREE ORDERS OF MAGNITUDE; ULTRA-FAST; VERIFICATION PROCESS;

EID: 84865701721     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32298-3_13     Document Type: Conference Paper
Times cited : (22)

References (51)
  • 7
    • 78049343086 scopus 로고    scopus 로고
    • Hybrid approach for solving multivariate systems over finite fields
    • Bettale, L., Faugère, J.-C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. Journal of Mathematical Cryptology 3(3), 177-197 (2009)
    • (2009) Journal of Mathematical Cryptology , vol.3 , Issue.3 , pp. 177-197
    • Bettale, L.1    Faugère, J.-C.2    Perret, L.3
  • 8
    • 79952495417 scopus 로고    scopus 로고
    • Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Bettale, L., Faugère, J.-C., Perret, L.: Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 441-458. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 441-458
    • Bettale, L.1    Faugère, J.-C.2    Perret, L.3
  • 9
    • 79952514770 scopus 로고    scopus 로고
    • Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Bouillaguet, C., Faugère, J.-C., Fouque, P.-A., Perret, L.: Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 473-493. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 473-493
    • Bouillaguet, C.1    Faugère, J.-C.2    Fouque, P.-A.3    Perret, L.4
  • 13
    • 38049058300 scopus 로고    scopus 로고
    • Invertible Cycles for Ultivariate Uadratic (q) Public Key Cryptography
    • Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
    • Ding, J., Wolf, C., Yang, B.-Y.: -Invertible Cycles for Ultivariate Uadratic (q) Public Key Cryptography. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 266-281. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4450 , pp. 266-281
    • Ding, J.1    Wolf, C.2    Yang, B.-Y.3
  • 14
    • 45749150774 scopus 로고    scopus 로고
    • New Differential-Algebraic Attacks and Reparametrization of Rainbow
    • Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
    • Ding, J., Yang, B.-Y., Chen, C.-H.O., Chen, M.-S., Cheng, C.-M.: New Differential-Algebraic Attacks and Reparametrization of Rainbow. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 242-257. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5037 , pp. 242-257
    • Ding, J.1    Yang, B.-Y.2    Chen, C.-H.O.3    Chen, M.-S.4    Cheng, C.-M.5
  • 15
    • 25944479355 scopus 로고
    • Efficient computation of zerodimensional Gröbner bases by change of ordering
    • Faugère, J.C., Gianni, P., Lazard, D., Mora, T.: Efficient computation of zerodimensional Gröbner bases by change of ordering. J. Symb. Comput. 16, 329-344 (1993)
    • (1993) J. Symb. Comput. , vol.16 , pp. 329-344
    • Faugère, J.C.1    Gianni, P.2    Lazard, D.3    Mora, T.4
  • 17
    • 78651082594 scopus 로고    scopus 로고
    • Analysis of the MQQ Public Key Cryptosystem
    • Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. Springer, Heidelberg
    • Faugère, J.-C., Ødegård, R.S., Perret, L., Gligoroski, D.: Analysis of the MQQ Public Key Cryptosystem. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol. 6467, pp. 169-183. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6467 , pp. 169-183
    • Faugère, J.-C.1    Ødegård, R.S.2    Perret, L.3    Gligoroski, D.4
  • 18
    • 33746050364 scopus 로고    scopus 로고
    • Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Faugère, J.-C., Perret, L.: Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 30-47. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 30-47
    • Faugère, J.-C.1    Perret, L.2
  • 19
    • 24944454273 scopus 로고    scopus 로고
    • Differential Cryptanalysis for Multivariate Schemes
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Fouque, P.-A., Granboulan, L., Stern, J.: Differential Cryptanalysis for Multivariate Schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 341-353. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 341-353
    • Fouque, P.-A.1    Granboulan, L.2    Stern, J.3
  • 21
    • 84958958667 scopus 로고    scopus 로고
    • Public key block cipher based on multivariate quadratic quasigroups
    • ePrint Archive, Report 2008/320
    • Gligoroski, D., Markovski, S., Knapskog, S.J.: Public key block cipher based on multivariate quadratic quasigroups. Cryptology ePrint Archive, Report 2008/320
    • Cryptology
    • Gligoroski, D.1    Markovski, S.2    Knapskog, S.J.3
  • 22
    • 78650603590 scopus 로고    scopus 로고
    • Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups
    • World Scientific and Engineering Academy and Society (WSEAS), Stevens Point
    • Gligoroski, D., Markovski, S., Knapskog, S.J.: Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups. In: MATH 2008: Proceedings of the American Conference on Applied Mathematics, pp. 44-49. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point (2008)
    • (2008) MATH 2008: Proceedings of the American Conference on Applied Mathematics , pp. 44-49
    • Gligoroski, D.1    Markovski, S.2    Knapskog, S.J.3
  • 23
    • 84937500998 scopus 로고    scopus 로고
    • Cryptanalysis of the TTM Cryptosystem
    • Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
    • Goubin, L., Courtois, N.T.: Cryptanalysis of the TTM Cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 44-57. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 44-57
    • Goubin, L.1    Courtois, N.T.2
  • 24
    • 84937500998 scopus 로고    scopus 로고
    • Cryptanalysis of the TTM Cryptosystem
    • Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
    • Goubin, L., Courtois, N.T., Schlumbergersema, C.: Cryptanalysis of the TTM Cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 44-57. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 44-57
    • Goubin, L.1    Courtois, N.T.2    Schlumbergersema, C.3
  • 25
    • 85022127411 scopus 로고
    • Algebraic Methods for Constructing Asymmetric Cryptosystems
    • Calmet, J. (ed.) AAECC-3. Springer, Heidelberg
    • Imai, H., Matsumoto, T.: Algebraic Methods for Constructing Asymmetric Cryptosystems. In: Calmet, J. (ed.) AAECC-3. LNCS, vol. 229, pp. 108-119. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.229 , pp. 108-119
    • Imai, H.1    Matsumoto, T.2
  • 26
    • 0842267132 scopus 로고    scopus 로고
    • A construction of public key cryptosystem for realizing ciphertext of size 100 bit and digital signature scheme
    • Kasahara, M., Sakai, R.: A construction of public key cryptosystem for realizing ciphertext of size 100 bit and digital signature scheme. IEICE Transactions 87-A(1), 102-109 (2004)
    • (2004) IEICE Transactions , vol.87 A , Issue.1 , pp. 102-109
    • Kasahara, M.1    Sakai, R.2
  • 28
    • 84957060922 scopus 로고    scopus 로고
    • Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Kipnis, A., Shamir, A.: Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 19-30. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 19-30
    • Kipnis, A.1    Shamir, A.2
  • 29
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48(177), 203-209 (1987)
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 31
    • 85033537496 scopus 로고
    • Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption
    • Günther, C.G. (ed.) EUROCRYPT 1988. Springer, Heidelberg
    • Matsumoto, T., Imai, H.: Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419-453. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.330 , pp. 419-453
    • Matsumoto, T.1    Imai, H.2
  • 32
    • 85015402934 scopus 로고
    • Use of Elliptic Curves in Cryptography
    • Williams, H.C. (ed.) CRYPTO 1985. Springer, Heidelberg
    • Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 33
    • 0033424342 scopus 로고    scopus 로고
    • A public key system with signature and master key functions
    • Moh, T.: A public key system with signature and master key functions. Communications in Algebra (1999)
    • (1999) Communications in Algebra
    • Moh, T.1
  • 35
    • 71549124018 scopus 로고    scopus 로고
    • Algebraic Attack on the MQQ Public Key Cryptosystem
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
    • Mohamed, M.S.E., Ding, J., Buchmann, J., Werner, F.: Algebraic Attack on the MQQ Public Key Cryptosystem. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 392-401. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 392-401
    • Mohamed, M.S.E.1    Ding, J.2    Buchmann, J.3    Werner, F.4
  • 36
    • 24944519031 scopus 로고    scopus 로고
    • Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
    • Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
    • Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33-48. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 33-48
    • Patarin, J.1
  • 37
    • 0346111821 scopus 로고    scopus 로고
    • Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 98
    • Patarin, J.: Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 98. Des. Codes Cryptography 20, 175-209 (2000)
    • (2000) Des. Codes Cryptography , vol.20 , pp. 175-209
    • Patarin, J.1
  • 38
    • 24944522480 scopus 로고    scopus 로고
    • A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Perret, L.: A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 354-370. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 354-370
    • Perret, L.1
  • 40
    • 84865696339 scopus 로고    scopus 로고
    • Cyclicrainbow - A multivariate signature scheme with a partially cyclic public key based on rainbow
    • ePrint Archive, Report 2010/424
    • Petzoldt, A., Bulygin, S., Buchmann, J.: Cyclicrainbow - a multivariate signature scheme with a partially cyclic public key based on rainbow. Cryptology ePrint Archive, Report 2010/424 (2010), http://eprint.iacr.org/
    • (2010) Cryptology
    • Petzoldt, A.1    Bulygin, S.2    Buchmann, J.3
  • 41
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120-126 (1978)
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 44
    • 85006080539 scopus 로고
    • Efficient Signature Schemes Based on Birational Permutations
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Shamir, A.: Efficient Signature Schemes Based on Birational Permutations. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 1-12. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 1-12
    • Shamir, A.1
  • 45
    • 85006080539 scopus 로고
    • Efficient Signature Schemes Based on Birational Permutations
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Shamir, A.: Efficient Signature Schemes Based on Birational Permutations. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 1-12. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 1-12
    • Shamir, A.1
  • 46
    • 84940287616 scopus 로고    scopus 로고
    • Public key cryptography using permutation p-polynomials over finite fields
    • ePrint Archive, Report 2009/208
    • Singh, R.P., Sarma, B.K., Saikia, A.: Public key cryptography using permutation p-polynomials over finite fields. Cryptology ePrint Archive, Report 2009/208 (2009), http://eprint.iacr.org/
    • (2009) Cryptology
    • Singh, R.P.1    Sarma, B.K.2    Saikia, A.3
  • 48
    • 33747496018 scopus 로고    scopus 로고
    • On the security of stepwise triangular systems
    • Wolf, C., Braeken, A., Preneel, B.: On the security of stepwise triangular systems. Des. Codes Cryptography 40, 285-302 (2006)
    • (2006) Des. Codes Cryptography , vol.40 , pp. 285-302
    • Wolf, C.1    Braeken, A.2    Preneel, B.3
  • 49
    • 40249092492 scopus 로고    scopus 로고
    • Taxonomy of public key schemes based on the problem of multivariate quadratic equations
    • ePrint Archive, Report 2005/077
    • Wolf, C., Preneel, B.: Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive, Report 2005/077 (2005)
    • (2005) Cryptology
    • Wolf, C.1    Preneel, B.2
  • 50
    • 26444593242 scopus 로고    scopus 로고
    • Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
    • Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. Springer, Heidelberg
    • Yang, B.-Y., Chen, J.-M.: Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 518-531. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3574 , pp. 518-531
    • Yang, B.-Y.1    Chen, J.-M.2
  • 51
    • 33745816647 scopus 로고    scopus 로고
    • Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems
    • Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. Springer, Heidelberg
    • Yang, B.-Y., Cheng, C.-M., Chen, B.-R., Chen, J.-M.: Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 73-88. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3934 , pp. 73-88
    • Yang, B.-Y.1    Cheng, C.-M.2    Chen, B.-R.3    Chen, J.-M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.