Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/11496137_12guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Rainbow, a new multivariable polynomial signature scheme

Published: 07 June 2005 Publication History

Abstract

Balanced Oil and Vinegar signature schemes and the unbalanced Oil and Vinegar signature schemes are public key signature schemes based on multivariable polynomials. In this paper, we suggest a new signature scheme, which is a generalization of the Oil-Vinegar construction to improve the efficiency of the unbalanced Oil and Vinegar signature scheme. The basic idea can be described as a construction of multi-layer Oil-Vinegar construction and its generalization. We call our system a Rainbow signature scheme. We propose and implement a practical scheme, which works better than Sflash$^{v_2}$, in particular, in terms of signature generating time.

References

[1]
Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, and Louis Goubin. A fast and secure implementation of Sflash. In PKC 2003, LNCS, volume 2567, pages 267-278. Springer, 2003.
[2]
Nicolas T. Courtois. The security of hidden field equations (HFE). In C. Naccache, editor, Progress in cryptology, CT-RSA, LNCS, volume 2020, pages 266-281. Springer, 2001.
[3]
D. Coppersmith, J. Stern, and S. Vaudenay. The security of the birational permutation signature schemes. J. Cryptology, 10(3):207-221, 1997.
[4]
Dickson, Leonard Eugene. Definite forms in a finite field. Trans. Amer. Math. Soc., volume 10, pages 109-122, 1909.
[5]
Jintai Ding and Z Yin. Cryptanalysis of TTS and Tame-like signature schemes. In Third International Workshop on Applied Public Key Infrastructures. Springer, 2004.
[6]
Aviad Kipnis, Jacques Patarin, and Louis Goubin. Unbalanced oil and vinegar signature schemes. In Eurocrypt'99, LNCS, volume 1592, pages 206-222. Springer, 1999.
[7]
Aviad Kipnis and Adi Shamir. Cryptanalysis of the HFE public key cryptosystem by relinearization. In M. Wiener, editor, Advances in cryptology - Crypto '99, LNCS, volume 1666, pages 19-30. Springer, 1999.
[8]
T. Matsumoto and H. Imai. Public quadratic polynomial-tuples for efficient signature verification and message encryption. In C. G. Guenther, editor, Advances in cryptology - EUROCRYPT '88, LNCS, volume 330, pages 419-453. Springer, 1988.
[9]
J. Patarin. Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88. In D. Coppersmith, editor, Advances in Cryptology - Crypto '95, LNCS, volume 963, pages 248-261, 1995.
[10]
J. Patarin. Hidden field equations (HFE) and isomorphism of polynomials (IP): Two new families of asymmetric algorithms. In U. Maurer, editor, Eurocrypt'96, LNCS, volume 1070, pages 33-48. Springer, 1996.
[11]
Jacques Patarin, Nicolas Courtois, and Louis Goubin. Flash, a fast multivariate signature algorithm. In LNCS, volume 2020, pages 298-307. Springer, 2001.
[12]
Jacques Patarin, Louis Goubin, and Nicolas Courtois. C -+ * and HM: variations around two schemes of T. Matsumoto and H. Imai. In K. Ohta and D. Pei, editors, ASIACRYPT'98, LNCS, volume 1514, pages 35-50. Springer, 1998.
[13]
Adi Shamir. Efficient signature schemes based on birational permutations. In LNCS, Advances in cryptology - CRYPTO '98 (Santa Barbara, CA, 1998), volume 1462, pages 257-266. Springer, 1998.
[14]
Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-Yen Chou, Bo-Yin Yang Tractable Rational Map Signature In Serge Vaudenay, editors, Public Key Cryptosystems, PKC-2005, LNCS, volume 3386, pages 244-257 Springer, 2005.
[15]
Christopher Wolf, An Braeken, and Bart Preneel. Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC. http://eprint.iacr.org/2004/237.
[16]
B. Yang and J. Chen. A more secure and efficacious TTS signature scheme. ICISC'03, 2003. http://eprint.iacr.org/2003/160

Cited By

View all
  • (2024)Algorithm 1052: Evaluating a Boolean Polynomial on All Possible InputsACM Transactions on Mathematical Software10.1145/369995750:4(1-37)Online publication date: 10-Oct-2024
  • (2024)Lattice-based Multisignature Optimization for RAM Constrained DevicesProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670461(1-10)Online publication date: 30-Jul-2024
  • (2024)ZKFault: Fault Attack Analysis on Zero-Knowledge Based Post-quantum Digital Signature SchemesAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0944-4_5(132-167)Online publication date: 10-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACNS'05: Proceedings of the Third international conference on Applied Cryptography and Network Security
June 2005
528 pages
ISBN:3540262237
  • Editors:
  • John Ioannidis,
  • Angelos Keromytis,
  • Moti Yung

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 07 June 2005

Author Tags

  1. multivariable
  2. oil and vinegar
  3. public-key
  4. quadratic polynomials

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Algorithm 1052: Evaluating a Boolean Polynomial on All Possible InputsACM Transactions on Mathematical Software10.1145/369995750:4(1-37)Online publication date: 10-Oct-2024
  • (2024)Lattice-based Multisignature Optimization for RAM Constrained DevicesProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670461(1-10)Online publication date: 30-Jul-2024
  • (2024)ZKFault: Fault Attack Analysis on Zero-Knowledge Based Post-quantum Digital Signature SchemesAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0944-4_5(132-167)Online publication date: 10-Dec-2024
  • (2024)Non-interactive Zero-Knowledge from LPN and MQAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68400-5_10(321-360)Online publication date: 18-Aug-2024
  • (2024)Practical and Theoretical Cryptanalysis of VOXPost-Quantum Cryptography10.1007/978-3-031-62746-0_9(186-208)Online publication date: 12-Jun-2024
  • (2024)One Vector to Rule Them All: Key Recovery from One Vector in UOV SchemesPost-Quantum Cryptography10.1007/978-3-031-62746-0_5(92-108)Online publication date: 12-Jun-2024
  • (2024)Cryptanalysis of the SNOVA Signature SchemePost-Quantum Cryptography10.1007/978-3-031-62746-0_4(79-91)Online publication date: 12-Jun-2024
  • (2024)Improved Cryptanalysis of HFERPPublic-Key Cryptography – PKC 202410.1007/978-3-031-57718-5_14(413-440)Online publication date: 15-Apr-2024
  • (2024)HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature SchemeConstructive Side-Channel Analysis and Secure Design10.1007/978-3-031-57543-3_13(240-259)Online publication date: 9-Apr-2024
  • (2023)Look-up the Rainbow: Table-based Implementation of Rainbow Signature on 64-bit ARMv8 ProcessorsACM Transactions on Embedded Computing Systems10.1145/360714022:5(1-19)Online publication date: 26-Sep-2023
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media