Revisiting the cubic UOV signature scheme

Dung H. Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

As recently been emphasized by NSA and NIST, there is an increasing need for cryptographic schemes being secure against quantum computer attacks. Especially in the area of digital signature schemes,multivariate cryptography is one of the main candidates for this. At Inscrypt 2015, Nie et al. proposed a new multivariate signature scheme called CUOV [20], whose public key consists both of quadratic and cubic polynomials. However, the scheme was broken by an attack of Hashimoto [15]. In this paper we take a closer look on the CUOV scheme and its attack and propose two new multivariate signature schemes called CSSv and SVSv, which are secure against Hashimoto’s attack and all other known attacks on multivariate schemes. Especially our second construction SVSv is very efficient and outperforms current multivariate signature schemes such as UOV and Rainbow in terms of key and signature size.

Original languageEnglish
Title of host publicationInformation Security and Cryptology – ICISC 2016 - 19th International Conference, Revised Selected Papers
EditorsSeokhie Hong, Jong Hwan Park
PublisherSpringer Verlag
Pages223-238
Number of pages16
ISBN (Print)9783319531762
DOIs
Publication statusPublished - Jan 1 2017
Event19th International Conference on Information Security and Cryptology, ICISC 2016 - Seoul, Korea, Republic of
Duration: Nov 30 2016Dec 2 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10157 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other19th International Conference on Information Security and Cryptology, ICISC 2016
CountryKorea, Republic of
City Seoul
Period11/30/1612/2/16

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Revisiting the cubic UOV signature scheme'. Together they form a unique fingerprint.

  • Cite this

    Duong, D. H., Petzoldt, A., Wang, Y., & Takagi, T. (2017). Revisiting the cubic UOV signature scheme. In S. Hong, & J. H. Park (Eds.), Information Security and Cryptology – ICISC 2016 - 19th International Conference, Revised Selected Papers (pp. 223-238). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10157 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-53177-9_12