A Secure Variant of Yasuda, Takagi and Sakurai's Signature Scheme

Yasuda, Takagi and Sakurai proposed a new signature scheme in PQCrypto 2013 using quadratic forms over finited fields of odd characteristic. Later on two independent attacks were proposed by Hashimoto in PQCrypto 2014 and by Zhang and Tan in ICISC 2014 to break their scheme. The purpose of this paper is to fix the security problem of Yasuda, Takagi and Sakurai's scheme. We achieve this purpose by mixing their scheme with a special type HFEv polynomials to produce a new scheme, YTS-HFEv. We analyze its security and propose a practical parameter set with public key size about 57i¾?KB and security level $$2^{80}$$ 280.

[1]  Jintai Ding,et al.  ZHFE, a New Multivariate Public Key Encryption Scheme , 2014, PQCrypto.

[2]  Chik How Tan,et al.  Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme , 2014, ICISC.

[3]  Bo-Yin Yang,et al.  Degree of Regularity for HFEv and HFEv- , 2013, PQCrypto.

[4]  Chik How Tan,et al.  Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces , 2015, IACR Cryptol. ePrint Arch..

[5]  Chik How Tan,et al.  MI-T-HFE, A New Multivariate Signature Scheme , 2015, IMACC.

[6]  Rudolf Lide,et al.  Finite fields , 1983 .

[7]  Adi Shamir,et al.  Cryptanalysis of the Oil & Vinegar Signature Scheme , 1998, CRYPTO.

[8]  Louis Goubin,et al.  QUARTZ, 128-Bit Long Digital Signatures , 2001, CT-RSA.

[9]  Bo-Yin Yang,et al.  Square, a New Multivariate Encryption Scheme , 2009, CT-RSA.

[10]  Bo-Yin Yang,et al.  Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS , 2005, ACISP.

[11]  Luk Bettale,et al.  Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic , 2012, Designs, Codes and Cryptography.

[12]  Antoine Joux,et al.  Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases , 2003, CRYPTO.

[13]  Jintai Ding,et al.  Cryptanalysis of HFEv and Internal Perturbation of HFE , 2005, Public Key Cryptography.

[14]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[15]  Bart Preneel,et al.  On the security of stepwise triangular systems , 2006, Des. Codes Cryptogr..

[16]  Crystal Clough Square: A New Family of Multivariate Encryption Schemes , 2009 .

[17]  Hideki Imai,et al.  Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.

[18]  Louis Goubin,et al.  Cryptanalysis of the TTM Cryptosystem , 2000, ASIACRYPT.

[19]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[20]  Bart Preneel,et al.  Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC , 2004, SCN.

[21]  Jacques Patarin,et al.  Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.

[22]  Bart Preneel,et al.  Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations , 2005, IACR Cryptol. ePrint Arch..

[23]  Feipei Lai,et al.  A "Medium-Field" Multivariate Public-Key Encryption Scheme , 2006, CT-RSA.

[24]  Jintai Ding,et al.  Multivariate Public Key Cryptosystems (Advances in Information Security) , 2006 .

[25]  Yasufumi Hashimoto Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013 , 2014, PQCrypto.

[26]  Jintai Ding,et al.  Simple Matrix Scheme for Encryption , 2013, PQCrypto.

[27]  Jacques Stern,et al.  The security of the birational permutation signature schemes , 1997, Journal of Cryptology.

[28]  Adi Shamir,et al.  Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization , 1999, CRYPTO.

[29]  Antoine Joux,et al.  Inverting HFE Is Quasipolynomial , 2006, CRYPTO.

[30]  Jacques Patarin,et al.  Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.

[31]  Yu-Jun Zheng,et al.  Improving Enhanced Fireworks Algorithm with New Gaussian Explosion and Population Selection Strategies , 2014, ICSI.

[32]  Bo-Yin Yang,et al.  l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography , 2007, Public Key Cryptography.

[33]  Tsuyoshi Takagi,et al.  Multivariate Signature Scheme Using Quadratic Forms , 2013, PQCrypto.

[34]  Louis Goubin,et al.  Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.