EFFICIENT PUBLIC-KEY OPERATION IN MULTIVARIATE SCHEMES

被引:1
|
作者
Cabarcas, Felipe [1 ]
Cabarcas, Daniel [2 ]
Baena, John [2 ]
机构
[1] Univ Antioquia UdeA, Grp SISTEMIC, Dept Ingn Elect, Calle 70 52-21, Medellin, Colombia
[2] Univ Nacl Colombia Sede Medellin, Calle 59 A 63-20, Medellin, Colombia
关键词
Multivariate public-key cryptography; encryption schemes; signature schemes; ZHFE; UOV; Rainbow; algebraic attack; x86; architecture; SIMD; PCLMULQDQ; CRYPTANALYSIS; HFE; SYSTEMS; ATTACK;
D O I
10.3934/amc.2019023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The public-key operation in multivariate encryption and signature schemes evaluates m quadratic polynomials in n variables. In this paper we analyze how fast this simple operation can be made. We optimize it for different finite fields on modern architectures. We provide an objective and inherent efficiency measure of our implementations, by comparing their performance with the peak performance of the CPU. In order to provide a fair comparison for different parameter sets, we also analyze the expected security based on the algebraic attack taking into consideration the hybrid approach. We compare the attack's efficiency for different finite fields and establish trends. We detail the role that the field equations play in the attack. We then provide a broad picture of efficiency of MQ-public-key operation against security.
引用
收藏
页码:343 / 371
页数:29
相关论文
共 50 条
  • [21] Public-Key Encryption with Efficient Amortized Updates
    Chandran, Nishanth
    Ostrovsky, Rafail
    Skeith, William E., III
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 17 - +
  • [22] Practical modification of an efficient public-key framework
    Yang, JP
    Sur, C
    Jang, HS
    Rhee, KH
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 554 - 557
  • [23] A refined definition of semantic security for public-key encryption schemes
    Sakai, H
    Nakamura, N
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (01): : 34 - 39
  • [24] Quantum public-key encryption schemes based on conjugate coding
    Yang, Li
    Yang, Biyao
    Xiang, Chong
    QUANTUM INFORMATION PROCESSING, 2020, 19 (11)
  • [25] Selective opening security of practical public-key encryption schemes
    Heuer, Felix
    Jager, Tibor
    Schaege, Sven
    Kiltz, Eike
    IET INFORMATION SECURITY, 2016, 10 (06) : 304 - 318
  • [26] Provably secure public-key encryption schemes: EPOC and PSEC
    Okamoto, Tatsuaki
    Fujisaki, Eiichiro
    Uchiyama, Shigenori
    NTT R and D, 1999, 48 (10): : 740 - 749
  • [27] On the Selective Opening Security of Practical Public-Key Encryption Schemes
    Heuer, Felix
    Jager, Tibor
    Kiltz, Eike
    Schaege, Sven
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 27 - 51
  • [28] Quantum public-key encryption schemes based on conjugate coding
    Li Yang
    Biyao Yang
    Chong Xiang
    Quantum Information Processing, 2020, 19
  • [29] Storage and computation optimization of public-key schemes on embedded devices
    Winderickx, Jori
    Braeken, An
    Mentens, Nele
    2018 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2018,
  • [30] BELL ALGORITHM SPEEDS DECRYPTION OF PUBLIC-KEY CODING SCHEMES
    HINDIN, HJ
    ELECTRONICS, 1981, 54 (16): : 39 - 40