EFFICIENT PUBLIC-KEY OPERATION IN MULTIVARIATE SCHEMES

被引:1
|
作者
Cabarcas, Felipe [1 ]
Cabarcas, Daniel [2 ]
Baena, John [2 ]
机构
[1] Univ Antioquia UdeA, Grp SISTEMIC, Dept Ingn Elect, Calle 70 52-21, Medellin, Colombia
[2] Univ Nacl Colombia Sede Medellin, Calle 59 A 63-20, Medellin, Colombia
关键词
Multivariate public-key cryptography; encryption schemes; signature schemes; ZHFE; UOV; Rainbow; algebraic attack; x86; architecture; SIMD; PCLMULQDQ; CRYPTANALYSIS; HFE; SYSTEMS; ATTACK;
D O I
10.3934/amc.2019023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The public-key operation in multivariate encryption and signature schemes evaluates m quadratic polynomials in n variables. In this paper we analyze how fast this simple operation can be made. We optimize it for different finite fields on modern architectures. We provide an objective and inherent efficiency measure of our implementations, by comparing their performance with the peak performance of the CPU. In order to provide a fair comparison for different parameter sets, we also analyze the expected security based on the algebraic attack taking into consideration the hybrid approach. We compare the attack's efficiency for different finite fields and establish trends. We detail the role that the field equations play in the attack. We then provide a broad picture of efficiency of MQ-public-key operation against security.
引用
收藏
页码:343 / 371
页数:29
相关论文
共 50 条
  • [1] Public-Key Identification Schemes Based on Multivariate Cubic Polynomials
    Sakumoto, Koichi
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 172 - 189
  • [2] Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
    Sakumoto, Koichi
    Shirai, Taizo
    Hiwatari, Harunaga
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 706 - 723
  • [3] Efficient public-key authenticated deniable encryption schemes
    Cao, Yanmei
    Wei, Jianghong
    Zhang, Fangguo
    Xiang, Yang
    Chen, Xiaofeng
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [4] Efficient Public-Key Certificate Revocation Schemes for Smart Grid
    Mahmoud, Mohamed M. E. A.
    Misic, Jelena
    Shen, Xuemin
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 778 - 783
  • [5] An efficient public-key framework
    Zhou, JY
    Bao, F
    Deng, R
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 88 - 99
  • [6] Public-Key Watermarking Schemes for Pseudorandom Functions
    Yang, Rupeng
    Yu, Zuoxia
    Au, Man Ho
    Susilo, Willy
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 637 - 667
  • [7] Efficient probabilistic public-key encryption schemes with |n|+k bit plaintexts
    Jiang, Zhengtao
    Liu, Jianwei
    Qin, Bo
    Wang, Yumin
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2008, 34 (01): : 43 - 46
  • [8] Public-Key Encryption Schemes with Auxiliary Inputs
    Dodis, Yevgeniy
    Goldwasser, Shafi
    Kalai, Yael Tauman
    Peikert, Chris
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 361 - +
  • [9] Security analysis of public-key watermarking schemes
    Craver, S
    Katzenbeisser, S
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 172 - 182
  • [10] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46