Rainbow, a New Multivariable Polynomial Signature Scheme
From MaRDI portal
Publication:3593140
DOI10.1007/11496137_12zbMath1126.68393OpenAlexW1536729852WikidataQ56700419 ScholiaQ56700419MaRDI QIDQ3593140
Dieter S. Schmidt, Jintai Ding
Publication date: 24 September 2007
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11496137_12
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
Post-quantum secure inner product functional encryption using multivariate public key cryptography ⋮ Computational quantum key distribution (CQKD) on decentralized ledger and blockchain ⋮ Reducing the Key Size of Rainbow Using Non-commutative Rings ⋮ Efficient Key Generation for Rainbow ⋮ LegRoast: Efficient Post-quantum Signatures from the Legendre PRF ⋮ Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme ⋮ A Structural Attack on Block-Anti-Circulant UOV at SAC 2019 ⋮ A Rank Attack Against Extension Field Cancellation ⋮ Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers ⋮ (Short paper) Simple matrix signature scheme ⋮ A scalable post-quantum hash-based group signature ⋮ Polynomial selection for computing Gröbner bases ⋮ A Secure Variant of the SRP Encryption Scheme with Shorter Private Key ⋮ The Shortest Signatures Ever ⋮ MI-T-HFE, A New Multivariate Signature Scheme ⋮ On methods of shortening ElGamal-type signatures ⋮ Cryptanalysis of RGB, a mixed multivariate signature scheme ⋮ Practical post-quantum signature schemes from isomorphism problems of trilinear forms ⋮ New complexity estimation on the rainbow-band-separation attack ⋮ Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme ⋮ Efficient public-key operation in multivariate schemes ⋮ A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV ⋮ A security analysis of uniformly-layered Rainbow defined over non-commutative rings ⋮ An algorithm for solving over-determined multivariate quadratic systems over finite fields ⋮ From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures ⋮ Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation ⋮ Refined F5 Algorithms for Ideals of Minors of Square Matrices ⋮ Multivariate public key cryptosystems from Diophantine equations ⋮ An estimator for the hardness of the MQ problem ⋮ Recovering Rainbow's secret key with a first-order fault attack ⋮ Breaking rainbow takes a weekend on a laptop ⋮ Puncturable signature: a generic construction and instantiations ⋮ Delegating signing rights in a multivariate proxy signature scheme ⋮ New Differential-Algebraic Attacks and Reparametrization of Rainbow ⋮ Hardness estimates of the code equivalence problem in the rank metric ⋮ Identity-based signature and extended forking algorithm in the multivariate quadratic setting ⋮ Cryptanalysis of matrix-based UOV ⋮ A new fault attack on UOV multivariate signature scheme ⋮ IPRainbow ⋮ Algebraic relation of three MinRank algebraic modelings ⋮ Efficient IBS from a new assumption in the multivariate-quadratic setting ⋮ Revisiting the security of salted UOV signature ⋮ Post-quantum verifiable random function from symmetric primitives in PoS blockchain ⋮ Cryptanalysis of \textsf{LRainbow}: the lifted rainbow signature scheme ⋮ Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives ⋮ Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems ⋮ Revisiting the Cubic UOV Signature Scheme ⋮ Public key compression for constrained linear signature schemes ⋮ Secure two-party computation in a quantum world ⋮ Equivalent keys in ℳultivariate uadratic public key systems ⋮ SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption ⋮ Total break of the SRP encryption scheme ⋮ A multivariate cryptosystem inspired by random linear codes ⋮ Revisiting the Efficient Key Generation of ZHFE ⋮ The singularity attack to the multivariate signature scheme HIMQ-3 ⋮ Cryptanalysis of the extension field cancellation cryptosystem ⋮ A Multivariate Encryption Scheme with Rainbow ⋮ Post-Quantum Cryptography: State of the Art ⋮ A new encryption scheme for multivariate quadratic systems ⋮ An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack ⋮ Recent Developments in Multivariate Public Key Cryptosystems ⋮ Hybrid MQ Signature for Embedded Device ⋮ Reducing the Key Size of the SRP Encryption Scheme ⋮ The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes ⋮ Improved cryptanalysis of UOV and Rainbow ⋮ A public key cryptosystem using a group of permutation polynomials ⋮ RingRainbow – An Efficient Multivariate Ring Signature Scheme ⋮ Multivariate public key cryptosystem from Sidon spaces ⋮ Banquet: short and fast signatures from AES ⋮ General Fault Attacks on Multivariate Public Key Cryptosystems ⋮ On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack ⋮ Roots of Square: Cryptanalysis of Double-Layer Square and Square+ ⋮ High-Speed Hardware Implementation of Rainbow Signature on FPGAs ⋮ A Security Analysis of Uniformly-Layered Rainbow ⋮ Key recovery attack on Circulant UOV/Rainbow ⋮ Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic system ⋮ A study on randomness used in signature generation of UOV ⋮ A new identity-based multivariate signature scheme ⋮ Fuzzy matching template attacks on multivariate cryptography: a case study ⋮ A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies ⋮ A Practical Multivariate Blind Signature Scheme ⋮ Progressive and efficient verification for digital signatures ⋮ Cryptanalysis of the lifted unbalanced oil vinegar signature scheme ⋮ New multivariate-based certificateless hybrid signcryption scheme for multi-recipient ⋮ Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography ⋮ A multivariate quadratic challenge toward post-quantum generation cryptography ⋮ Polynomial selection of <i>F</i><sub>4</sub> for solving the MQ problem ⋮ Security comparisons and performance analyses of post-quantum signature algorithms ⋮ Differential power analysis of the Picnic signature scheme
Uses Software