7 research outputs found
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
One of the most efficient post-quantum signature schemes is Rainbow whose harness is based on the multivariate quadratic polynomial (MQ) problem.
ELSA, a new multivariate signature scheme proposed at Asiacrypt 2017,has a similar construction to Rainbow.
Its advantages, compared to Rainbow, are its smaller secret key and faster signature generation.
In addition, its existential unforgeability against an adaptive chosen-message attack has been proven under the hardness of the MQ-problem induced by a public key of ELSA with a specific parameter set in the random oracle model.
The high efficiency of ELSA is derived from a set of hidden quadratic equations used in the process of signature generation.
However, the hidden quadratic equations yield a vulnerability.
In fact, a piece of information of these equations can be recovered by using valid signatures and an equivalent secret key can be partially recovered from it.
In this paper, we describe how to recover an equivalent secret key of ELSA by a chosen message attack.
Our experiments show that we can recover an equivalent secret key for the claimed -bit security parameter of ELSA on a standard PC in seconds with valid signatures
International Symposium on Mathematics, Quantum Theory, and Cryptography
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography
International Symposium on Mathematics, Quantum Theory, and Cryptography
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography
4.Uluslararası Öğrenciler Fen Bilimleri Kongresi Bildiriler Kitabı
Çevrimiçi ( XIII, 495 Sayfa ; 26 cm.)
XX Workshop de Investigadores en Ciencias de la Computación - WICC 2018 : Libro de actas
Actas del XX Workshop de Investigadores en Ciencias de la Computación (WICC 2018), realizado en Facultad de Ciencias Exactas y Naturales y Agrimensura de la Universidad Nacional del Nordeste, los dìas 26 y 27 de abril de 2018.Red de Universidades con Carreras en Informática (RedUNCI
XX Workshop de Investigadores en Ciencias de la Computación - WICC 2018 : Libro de actas
Actas del XX Workshop de Investigadores en Ciencias de la Computación (WICC 2018), realizado en Facultad de Ciencias Exactas y Naturales y Agrimensura de la Universidad Nacional del Nordeste, los dìas 26 y 27 de abril de 2018.Red de Universidades con Carreras en Informática (RedUNCI