Security Analysis of Reusing Vinegar Values in UOV Signature Scheme

被引:0
|
作者
Koo, Namhun [1 ]
Shim, Kyung-Ah [2 ]
机构
[1] Ewha Womans Univ, Dept Math, Seoul 03760, South Korea
[2] Natl Inst Math Sci, Daejeon 34047, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
基金
新加坡国家研究基金会;
关键词
Security; Polynomials; Linear systems; NIST; Complexity theory; Quantum computing; Cryptography; Equivalent key; key recovery attack; UOV; Vinegar value;
D O I
10.1109/ACCESS.2024.3409778
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multivariate quadratic equation-based cryptographic algorithms are one of the promising post-quantum alternatives to current public-key cryptographic algorithms based on the discrete logarithm problem and the integer factorization problem. In this paper, we provide advanced security analysis of UOV, a well-known signature scheme based on the multivariate quadratic equations, when Vinegar values are reused in signing for efficiency. We determine the minimum number of signatures generated by the reused Vinegar values required for UOV secret key recovery. More precisely, it is enough inverted left perpendicular v/o inverted right perpendicular + 1 signatures to recover the secret key in polynomial-time. According to our experimental results, we can recover the secret key of UOV from only three signatures generated by the reused Vinegar values in 72 ms, 498 ms and 1,527 ms on a desktop at the 128-bit, 192-bit and 256-bit security levels, respectively.
引用
收藏
页码:137412 / 137417
页数:6
相关论文
共 50 条
  • [31] Security analysis of the Gennaro-Halevi-Rabin signature scheme
    Coron, JS
    Naccache, D
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 91 - 101
  • [32] Analysis of the Security of the PSSI Problem and Cryptanalysis of the Durandal Signature Scheme
    Aragon, Nicolas
    Dyseryn, Victor
    Gaborit, Philippe
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III, 2023, 14083 : 127 - 149
  • [33] Security Analysis of Liu-Li Digital Signature Scheme
    Liu, Chenglian
    Zhang, Jianghong
    Deng, Shaoyi
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 63 - +
  • [34] Security Analysis of an Arbitrated Quantum Signature Scheme with Bell States
    Guoliang Xu
    Xiangfu Zou
    International Journal of Theoretical Physics, 2016, 55 : 4142 - 4156
  • [35] Security Analysis of an Arbitrated Quantum Signature Scheme with Bell States
    Xu, Guoliang
    Zou, Xiangfu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (09) : 4142 - 4156
  • [36] On the security of a convertible group signature scheme
    Saeednia, S
    INFORMATION PROCESSING LETTERS, 2000, 73 (3-4) : 93 - 96
  • [37] Verified Security of BLT Signature Scheme
    Firsov, Denis
    Buldas, Ahto
    Truu, Ahto
    Laanoja, Risto
    CPP '20: PROCEEDINGS OF THE 9TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS, 2020, : 244 - 257
  • [38] ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME
    HE, J
    KIESLER, T
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (04): : 249 - 252
  • [39] SECURITY OF XINMEI DIGITAL SIGNATURE SCHEME
    ALABBADI, M
    WICKER, SB
    ELECTRONICS LETTERS, 1992, 28 (09) : 890 - 891
  • [40] The security flaw of an untraceable signature scheme
    Chang, CC
    Chang, YF
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1379 - 1381