Cryptanalysis of RGB, a mixed multivariate signature scheme

被引:2
|
作者
Shim, Kyung-Ah [1 ]
Park, Cheol-Min [1 ]
Koo, Namhun [1 ]
机构
[1] Natl Inst Math Sci, Div Fus & Convergence Math Sci, 628 Daeduk Boulevard, Daejeon, South Korea
关键词
Equivalent key; Good key; Key recovery attack; Multivariate quadratic problem; UOV; OIL;
D O I
10.1016/j.ffa.2016.11.013
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Public-Key Cryptography (PKC) based on multivariate quadratic equations is one of the most promising alternatives for classical PKC after the eventual coming of quantum computers. Recently, Shen and Tang proposed a new MQ-signature scheme, RGB, based on three types of variables, Red(r), Green(g) and Blue(b). They claimed that signing for RGB is faster than that of UOV and Rainbow. At ACISP 2016, Tang et al. implemented RGB on S5PV210 and MT6582 microprocessors at 64, 80, 96, 118 and 128-bit security levels for practical use. Their results are much more efficient than other MQ-signature schemes, so RGB is very appealing for resource-limited devices. We show that ROB with their suggested parameters at 64, 80, 96, 118 and 128 security levels are entirely broken by key recovery attacks using good keys. From a practical point of view, we are able to break their parameters at 64, 80, 96, 118 and 128 security levels in less than 0.48 seconds, 1.7 seconds, 90.68 seconds, 11 minutes and 6.82 hours, respectively. Consequently, we show that signing and the key sizes for RGB with secure parameter sets are much slower and larger than those of UOV and Rainbow. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:406 / 421
页数:16
相关论文
共 50 条
  • [31] Cryptanalysis and improvement of a threshold proxy signature scheme
    Hu, Jianghong
    Zhang, Jianzhong
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 169 - 173
  • [32] Cryptanalysis on a proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 117 - +
  • [33] Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme
    Tan, Zuo-Wen
    Liu, Zhuo-Jun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 25 (02) : 619 - 631
  • [34] Cryptanalysis of a compact certificateless aggregate signature scheme
    Chen, Chih-Cheng
    Chien, Hanmin
    Horng, Gwoboa
    International Journal of Network Security, 2016, 18 (04) : 793 - 797
  • [35] Cryptanalysis of a Certificate-Based on Signature Scheme
    Cheng, Lin
    Xiao, Ying
    Wang, Gang
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2821 - 2825
  • [36] Cryptanalysis of the enhanced ElGamal's signature scheme
    Laih, CS
    Kuo, WC
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 228 - 231
  • [37] Cryptanalysis and improvement of a certificateless signature scheme in the standard model
    Hu, Guo-Zheng
    Han, Lan-Sheng
    Wang, Zhan-Qing
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 54 - 58
  • [38] Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments
    Zhang, Bo
    Zhu, Tianqing
    Hu, Chengyu
    Zhao, Chuan
    IEEE ACCESS, 2018, 6 : 73885 - 73894
  • [39] Cryptanalysis of threshold proxy signature scheme based on factoring
    Liu Feng
    Gao Dong-Mei
    Cui Guang-Hai
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 473 - +
  • [40] Cryptanalysis of Xia-You group signature scheme
    Shao, ZH
    JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 75 (1-2) : 89 - 94