Cryptanalysis of RGB, a mixed multivariate signature scheme

被引:2
|
作者
Shim, Kyung-Ah [1 ]
Park, Cheol-Min [1 ]
Koo, Namhun [1 ]
机构
[1] Natl Inst Math Sci, Div Fus & Convergence Math Sci, 628 Daeduk Boulevard, Daejeon, South Korea
关键词
Equivalent key; Good key; Key recovery attack; Multivariate quadratic problem; UOV; OIL;
D O I
10.1016/j.ffa.2016.11.013
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Public-Key Cryptography (PKC) based on multivariate quadratic equations is one of the most promising alternatives for classical PKC after the eventual coming of quantum computers. Recently, Shen and Tang proposed a new MQ-signature scheme, RGB, based on three types of variables, Red(r), Green(g) and Blue(b). They claimed that signing for RGB is faster than that of UOV and Rainbow. At ACISP 2016, Tang et al. implemented RGB on S5PV210 and MT6582 microprocessors at 64, 80, 96, 118 and 128-bit security levels for practical use. Their results are much more efficient than other MQ-signature schemes, so RGB is very appealing for resource-limited devices. We show that ROB with their suggested parameters at 64, 80, 96, 118 and 128 security levels are entirely broken by key recovery attacks using good keys. From a practical point of view, we are able to break their parameters at 64, 80, 96, 118 and 128 security levels in less than 0.48 seconds, 1.7 seconds, 90.68 seconds, 11 minutes and 6.82 hours, respectively. Consequently, we show that signing and the key sizes for RGB with secure parameter sets are much slower and larger than those of UOV and Rainbow. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:406 / 421
页数:16
相关论文
共 50 条
  • [41] Cryptanalysis of new proxy blind signature scheme with warrant
    Li Jiguo
    Zhang Yichen
    Yang Songtao
    ADVANCES IN COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2005, VOLS 4 A & 4 B, 2005, 4A-4B : 1741 - 1744
  • [42] Cryptanalysis and improvement of a certificateless strong proxy signature scheme
    Hu, Guo-Zheng
    Han, Lan-Sheng
    Wang, Zhan-Qing
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2011, 34 (05): : 115 - 118
  • [43] Cryptanalysis of a Batch Proxy Quantum Blind Signature Scheme
    Cai, Xiao-Qiu
    Zheng, Yu-Hui
    Zhang, Rui-Ling
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (09) : 3109 - 3115
  • [44] Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme
    Ke-Jia Zhang
    Heng-Yue Jia
    International Journal of Theoretical Physics, 2015, 54 : 582 - 588
  • [45] Cryptanalysis of the OTM signature scheme from FC'02
    Stern, J
    Stern, JP
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 138 - 148
  • [46] Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme
    Zhang, Ke-Jia
    Jia, Heng-Yue
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (02) : 582 - 588
  • [47] Cryptanalysis of a certificateless aggregate signature scheme with efficient verification
    Shen, Han
    Chen, Jianhua
    Shen, Jian
    He, Debiao
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2217 - 2221
  • [48] Cryptanalysis of a certificateless aggregate signature scheme for mobile computation
    Khan, Muhammad Khurram
    He, Debiao
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (04): : 1383 - 1386
  • [49] Cryptanalysis and improvement of a proxy-protected signature scheme
    Hu, Xiaoming
    Zhang, Zhe
    Wang, Tong
    SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 363 - 366
  • [50] Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme
    Chen, Y.-C. (s9756034@cs.nchu.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21):