Unbalanced Oil and Vinegar Signature Schemes
From MaRDI portal
Publication:4250763
DOI10.1007/3-540-48910-X_15zbMath0933.94031OpenAlexW1628272610MaRDI QIDQ4250763
Louis Goubin, Aviad Kipnis, Jacques Patarin
Publication date: 6 April 2000
Published in: Advances in Cryptology — EUROCRYPT ’99 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-48910-x_15
Related Items
Post-quantum secure inner product functional encryption using multivariate public key cryptography ⋮ MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature ⋮ Reducing the Key Size of Rainbow Using Non-commutative Rings ⋮ Efficient Key Generation for Rainbow ⋮ Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme ⋮ A Structural Attack on Block-Anti-Circulant UOV at SAC 2019 ⋮ Practical Cryptanalysis of k-ary $$C^*$$ ⋮ A Rank Attack Against Extension Field Cancellation ⋮ (Short paper) Simple matrix signature scheme ⋮ A scalable post-quantum hash-based group signature ⋮ A new perturbation algorithm and enhancing security of SFLASH signature scheme ⋮ Key recovery attack on Hufu-UOV ⋮ Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU ⋮ A Secure Variant of the SRP Encryption Scheme with Shorter Private Key ⋮ Blending FHE-NTRU Keys – The Excalibur Property ⋮ The Shortest Signatures Ever ⋮ MI-T-HFE, A New Multivariate Signature Scheme ⋮ Unnamed Item ⋮ On methods of shortening ElGamal-type signatures ⋮ On enumeration of polynomial equivalence classes ⋮ Cryptanalysis of RGB, a mixed multivariate signature scheme ⋮ Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic ⋮ New complexity estimation on the rainbow-band-separation attack ⋮ Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme ⋮ Efficient public-key operation in multivariate schemes ⋮ A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV ⋮ A security analysis of uniformly-layered Rainbow defined over non-commutative rings ⋮ An algorithm for solving over-determined multivariate quadratic systems over finite fields ⋮ From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures ⋮ Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation ⋮ Multivariate public key cryptosystems from Diophantine equations ⋮ Implicit white-box implementations: white-boxing ARX ciphers ⋮ An estimator for the hardness of the MQ problem ⋮ Recovering Rainbow's secret key with a first-order fault attack ⋮ Breaking rainbow takes a weekend on a laptop ⋮ Partial key exposure attacks on BIKE, Rainbow and NTRU ⋮ Puncturable signature: a generic construction and instantiations ⋮ Delegating signing rights in a multivariate proxy signature scheme ⋮ Cryptanalysis of the TRMS Signature Scheme of PKC’05 ⋮ New Differential-Algebraic Attacks and Reparametrization of Rainbow ⋮ An improvement of algorithms to solve under-defined systems of multivariate quadratic equations ⋮ A technique to reduce memory usage of M4GB algorithm ⋮ Identity-based signature and extended forking algorithm in the multivariate quadratic setting ⋮ Cryptanalysis of matrix-based UOV ⋮ A new fault attack on UOV multivariate signature scheme ⋮ IPRainbow ⋮ 2F -- a new method for constructing efficient multivariate encryption schemes ⋮ Algebraic relation of three MinRank algebraic modelings ⋮ Efficient IBS from a new assumption in the multivariate-quadratic setting ⋮ Revisiting the security of salted UOV signature ⋮ On the equivalence of two post-quantum cryptographic families ⋮ Key recovery attack on the cubic ABC Simple Matrix Multivariate Encryption Scheme ⋮ Square-Vinegar Signature Scheme ⋮ Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives ⋮ Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems ⋮ Revisiting the Cubic UOV Signature Scheme ⋮ Public key compression for constrained linear signature schemes ⋮ SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption ⋮ Total break of the SRP encryption scheme ⋮ A multivariate cryptosystem inspired by random linear codes ⋮ Revisiting the Efficient Key Generation of ZHFE ⋮ The singularity attack to the multivariate signature scheme HIMQ-3 ⋮ Unnamed Item ⋮ Cryptanalysis of the extension field cancellation cryptosystem ⋮ A Multivariate Encryption Scheme with Rainbow ⋮ QUAD: A multivariate stream cipher with provable security ⋮ Post-Quantum Cryptography: State of the Art ⋮ A new encryption scheme for multivariate quadratic systems ⋮ A Variant of the F4 Algorithm ⋮ An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack ⋮ Recent Developments in Multivariate Public Key Cryptosystems ⋮ Hybrid MQ Signature for Embedded Device ⋮ The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes ⋮ Improved cryptanalysis of UOV and Rainbow ⋮ Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) ⋮ A public key cryptosystem using a group of permutation polynomials ⋮ RingRainbow – An Efficient Multivariate Ring Signature Scheme ⋮ Multivariate public key cryptosystem from Sidon spaces ⋮ Practical complexities of probabilistic algorithms for solving Boolean polynomial systems ⋮ On enumeration of polynomial equivalence classes and their application to MPKC ⋮ General Fault Attacks on Multivariate Public Key Cryptosystems ⋮ On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack ⋮ On the Differential Security of Multivariate Public Key Cryptosystems ⋮ A Security Analysis of Uniformly-Layered Rainbow ⋮ Key recovery attack on Circulant UOV/Rainbow ⋮ Cryptanalysis of the new TTS scheme in CHES 2004 ⋮ Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic system ⋮ A study on randomness used in signature generation of UOV ⋮ A new identity-based multivariate signature scheme ⋮ A Practical Multivariate Blind Signature Scheme ⋮ Unnamed Item ⋮ New multivariate-based certificateless hybrid signcryption scheme for multi-recipient ⋮ A new post-quantum multivariate polynomial public key encapsulation algorithm ⋮ A multivariate quadratic challenge toward post-quantum generation cryptography ⋮ Security comparisons and performance analyses of post-quantum signature algorithms ⋮ Improving Thomae-Wolf algorithm for solving underdetermined multivariate quadratic polynomial problem ⋮ New practical multivariate signatures from a nonlinear modifier ⋮ Differential power analysis of the Picnic signature scheme ⋮ Verifying post-quantum signatures in 8 kB of RAM