Cryptanalysis of Matrix-based UOV

Abstract The Unbalanced Oil and Vinegar signature scheme (UOV) is one of multivariate quadratic public key cryptosystems and remains unbroken. In Inscrypt 2015, Tan and Tang proposed variants of UOV, Matrix-based UOV, to reduce the size of the secret key and generate signature faster. We show that Matrix-based UOV is entirely broken by finding equivalent keys in polynomial-time. In practice, we can forge Matrix-based UOV signature at 80 and 100 security levels in less than 0.37 seconds and 0.53 seconds, respectively.

[1]  Louis Goubin,et al.  Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.

[2]  Tsuyoshi Takagi,et al.  A variant of rainbow with shorter secret key and faster signature generation , 2013, AsiaPKC '13.

[3]  Ariel Shamir,et al.  Cryptanalysis of the oil and vinegar signature scheme , 1998 .

[4]  Henri Cohen,et al.  A course in computational algebraic number theory , 1993, Graduate texts in mathematics.

[5]  Bart Preneel,et al.  Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems , 2005, Public Key Cryptography.

[6]  J. Faugère A new efficient algorithm for computing Gröbner bases (F4) , 1999 .

[7]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[8]  Albrecht Petzoldt,et al.  Selecting and reducing key sizes for multivariate cryptography , 2013 .

[9]  Shaohua Tang,et al.  Two Approaches to Build UOV Variants with Shorter Private Key and Faster Signature Generation , 2015, Inscrypt.

[10]  Louis Goubin,et al.  Cryptanalysis of the TTM Cryptosystem , 2000, ASIACRYPT.

[11]  John J. Cannon,et al.  The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..

[12]  Jintai Ding,et al.  Rainbow, a New Multivariable Polynomial Signature Scheme , 2005, ACNS.

[13]  Chen-Mou Cheng,et al.  New Differential-Algebraic Attacks and Reparametrization of Rainbow , 2008, ACNS.

[14]  Enrico Thomae,et al.  About the security of multivariate quadratic public key schemes , 2013 .