Security Analysis of Reusing Vinegar Values in UOV Signature Scheme

被引:0
|
作者
Koo, Namhun [1 ]
Shim, Kyung-Ah [2 ]
机构
[1] Ewha Womans Univ, Dept Math, Seoul 03760, South Korea
[2] Natl Inst Math Sci, Daejeon 34047, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
基金
新加坡国家研究基金会;
关键词
Security; Polynomials; Linear systems; NIST; Complexity theory; Quantum computing; Cryptography; Equivalent key; key recovery attack; UOV; Vinegar value;
D O I
10.1109/ACCESS.2024.3409778
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multivariate quadratic equation-based cryptographic algorithms are one of the promising post-quantum alternatives to current public-key cryptographic algorithms based on the discrete logarithm problem and the integer factorization problem. In this paper, we provide advanced security analysis of UOV, a well-known signature scheme based on the multivariate quadratic equations, when Vinegar values are reused in signing for efficiency. We determine the minimum number of signatures generated by the reused Vinegar values required for UOV secret key recovery. More precisely, it is enough inverted left perpendicular v/o inverted right perpendicular + 1 signatures to recover the secret key in polynomial-time. According to our experimental results, we can recover the secret key of UOV from only three signatures generated by the reused Vinegar values in 72 ms, 498 ms and 1,527 ms on a desktop at the 128-bit, 192-bit and 256-bit security levels, respectively.
引用
收藏
页码:137412 / 137417
页数:6
相关论文
共 50 条
  • [21] The security analysis of a threshold proxy quantum signature scheme
    SHI JianHong
    ZHANG ShengLi
    CHANG ZhengGang
    Science China(Physics,Mechanics & Astronomy), 2013, (03) : 519 - 523
  • [22] Security analysis of a homomorphic signature scheme for network coding
    Cheng, Chi
    Jiang, Tao
    Liu, Yining
    Zhang, Mingwu
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4053 - 4060
  • [23] On the security of group signature scheme and designated verifier signature scheme
    Zhang, Jianhong
    Geng, Qin
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 351 - 358
  • [24] On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack
    Sakumoto, Koichi
    Shirai, Taizo
    Hiwatari, Harunaga
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 68 - 82
  • [25] On the security of a group signature scheme
    Zhang, Jianhong
    Geng, Qin
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1310 - 1314
  • [26] On the security of a Certificateless Signature Scheme
    Cheng, Lin
    Wen, Qiao Yan
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 965 - 968
  • [27] On the security of an enhanced signature scheme
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    International Journal of Information and Communication Technology, 2014, 6 (01) : 1 - 6
  • [28] On the security of a group signature scheme with forward security
    Wang, GL
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 27 - 39
  • [29] Security Analysis of a Proxy Blind Signature Scheme Based on ECDLP
    Yang, Xuan
    Yu, Zhaoping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4732 - 4735
  • [30] Security analysis of the certificateless signature scheme proposed at SecUbiq 2006
    Park, Je Hong
    Kang, Bo Gyeong
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 686 - 691