The security of the birational permutation signature schemes (Q1364903): Difference between revisions
From MaRDI portal
Removed claim: reviewed by (P1447): Item:Q429343 |
Changed an Item |
||
Property / reviewed by | |||
Property / reviewed by: Vladimir G. Pestov / rank | |||
Normal rank |
Revision as of 02:30, 15 February 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | The security of the birational permutation signature schemes |
scientific article |
Statements
The security of the birational permutation signature schemes (English)
0 references
31 January 1999
0 references
The paper describes several attacks which can be applied to the family of signature schemes proposed by \textit{A. Shamir} [Advances in Cryptology -- CRYPTO'93, Santa Barbara, CA, Lect. Notes Comput. Sci. 773, 1-12 (1994; Zbl 0877.94041)]. Shamir's schemes were put forward as a possible alternative to the RSA signature scheme, employing polynomials of low degree and of several variables taking values in the ring \({\mathbb Z}_N\) with \(N\) large (e.g. one of the schemes under consideration is based on quadratic forms) and consequently having lower computational requirements, and they also improved on an earlier scheme [\textit{H. Ong, C. P. Schnorr} and \textit{A. Shamir}, A fast signature scheme based on quadratic equations, Proc. 16th ACM Symp. Theory of Computing, 208-216 (1984); see also Zbl 0571.94015)], which was broken in [\textit{J. M. Pollard} and \textit{C. P. Schnorr}, An efficient solution of the congruence \(x^2+ky^2=m\pmod n\), IEEE Trans. Inf. Theory IT-33, No. 5, 702-709 (1987; Zbl 0636.94008)]. The conclusion of the authors is that Shamir's schemes are vulnerable to the proposed attacks. Many proofs in the paper are based on the following `rule of the thumb,' supported by some mathematical arguments but still largely heuristic: if \(N\) is a large composite integer whose prime factorization is unknown, then in many situations one is free to treat the ring \({\mathbb Z}_N={\mathbb Z}/N{\mathbb Z}\) as a field, at least in the algorithmic aspects, through pretending that one is working in some \({\mathbb Z}_p\). Discovering the exact nature of the phenomenon behind this principle is a challenging problem for an interested model theorist.
0 references
signature schemes
0 references
birational permutations
0 references
cryptanalysis
0 references
Shamir scheme
0 references
Galois theory
0 references
quadratic forms
0 references