EFFICIENT PUBLIC-KEY OPERATION IN MULTIVARIATE SCHEMES

被引:1
|
作者
Cabarcas, Felipe [1 ]
Cabarcas, Daniel [2 ]
Baena, John [2 ]
机构
[1] Univ Antioquia UdeA, Grp SISTEMIC, Dept Ingn Elect, Calle 70 52-21, Medellin, Colombia
[2] Univ Nacl Colombia Sede Medellin, Calle 59 A 63-20, Medellin, Colombia
关键词
Multivariate public-key cryptography; encryption schemes; signature schemes; ZHFE; UOV; Rainbow; algebraic attack; x86; architecture; SIMD; PCLMULQDQ; CRYPTANALYSIS; HFE; SYSTEMS; ATTACK;
D O I
10.3934/amc.2019023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The public-key operation in multivariate encryption and signature schemes evaluates m quadratic polynomials in n variables. In this paper we analyze how fast this simple operation can be made. We optimize it for different finite fields on modern architectures. We provide an objective and inherent efficiency measure of our implementations, by comparing their performance with the peak performance of the CPU. In order to provide a fair comparison for different parameter sets, we also analyze the expected security based on the algebraic attack taking into consideration the hybrid approach. We compare the attack's efficiency for different finite fields and establish trends. We detail the role that the field equations play in the attack. We then provide a broad picture of efficiency of MQ-public-key operation against security.
引用
收藏
页码:343 / 371
页数:29
相关论文
共 50 条
  • [41] Efficient VLSI architecture for RSA public-key cryptosystem
    Chiang, Jen-Shiun
    Chen, Jian-Kao
    Proceedings - IEEE International Symposium on Circuits and Systems, 1999, 1
  • [42] Public-key quantum signature based on phase shift operation
    Qin, Huawang
    Xu, Hao
    Tang, Wallace K. S.
    MODERN PHYSICS LETTERS B, 2020, 34 (06):
  • [43] Quantum-resistant public-key encryption and signature schemes with smaller key sizes
    Soni, Lacchita
    Chandra, Harish
    Gupta, Daya Sagar
    Keval, Ram
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01): : 285 - 297
  • [44] Quantum-resistant public-key encryption and signature schemes with smaller key sizes
    Lacchita Soni
    Harish Chandra
    Daya Sagar Gupta
    Ram Keval
    Cluster Computing, 2024, 27 : 285 - 297
  • [45] Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes
    Wang Houzhen
    Shen Changxiang
    Xu Zhengquan
    Zhang Huanguo
    CHINA COMMUNICATIONS, 2011, 8 (04) : 23 - 31
  • [46] Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
    Lee, Kwangsu
    Koo, Woo Kwon
    Lee, Dong Hoon
    Park, Jong Hwan
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 1 - 18
  • [47] Public-Key Cryptanalysis
    Nguyen, Phong Q.
    RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 67 - 119
  • [48] PUBLIC-KEY SYSTEMS
    BRASSARD, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 325 : 20 - 39
  • [49] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [50] PUBLIC-KEY PATENT
    BENNETT, R
    BYTE, 1985, 10 (07): : 16 - 16