1. Introduction
Asymmetric key cryptosystems have solved the key distribution problem arising from the widespread use of symmetric key cryptosystems. In contrast to symmetric key cryptosystems which utilize the same key to encrypt and decrypt, asymmetric key cryptosystems use different keys known as public and private keys. Furthermore, asymmetric key cryptosystems not only solve the key distribution problem and provide confidentiality but also provide entity authentication, preserve message integrity and prevent identity repudiation. The public–private key pair is generated by the Certificate Authority (CA). However, a client might receive key pairs generated from a rogue Certificate Authority (RCA) who hides the fact that the produced key pairs have weaknesses that are only known to nobody else except the RCA [
1]. The public key which works perfectly and satisfies the public security requirements during the key generation process, can be manipulated by an adversary in order to recover the secret parameters.
A digital signature is defined as a mathematical procedure which provides the authenticity and integrity of a message. The private signing key is used in the signing algorithm to sign the document and produce valid signatures; meanwhile, the public key is used in the verification algorithm to verify the validity of the signature corresponding to the document. In addition, forgery is an act of making a copy of a valid signature or document in order to deceive someone.
In 1994, [
2] proved that classical cryptography will be no longer secure in the existence of a quantum computer. A quantum computer can solve hard problems such as Integer Factorization Problem (IFP) [
3] and Discrete Log Problem (DLP) [
4] in polynomial time. Hence, we require post-quantum cryptography algorithms which are resistant to a quantum computer. Among the candidates of post-quantum cryptography is multivariate cryptography.
In multivariate public key cryptography (MPKC), the underlying hard problem is defined as the Multivariate Quadratic Problem (MQP). In MQP,
is a system of
m quadratic equations in
n variables under the finite field
. One needs to identify a vector
such that the system of polynomials
[
5]. In order to forge a multivariate signature scheme, one has either to produce a valid signature
s’ such that
or recover secret keys
and
.
The Unbalanced Oil and Vinegar (UOV) scheme by [
6] requires one to choose
o number of equations and
number of variables where
. This is an amendment to the Oil and Vinegar (OV) scheme [
7] that was successfully cryptoanalysed by Kipnis and Shamir attack [
8]. The initial OV scheme sets
[
7]. On the other hand, the Rainbow signature scheme [
9] is a multilayer version of UOV with smaller key and signature sizes which initiate better performance. In 2017, another version of UOV which utilizes smaller key and signature sizes was proposed and coined the LUOV cryptosystem [
10]. In 2020, Petzolt proposed an algorithm to speed up the key generation of Rainbow [
11].
The National Institute of Standards and Technology (NIST) announced the request for nominations for public key post-quantum cryptographic algorithms in 2016 in preparation for the quantum computing era. Since then, many quantum algorithms resistant to quantum computers have been proposed, including [
12,
13,
14,
15,
16]. The Rainbow signature scheme successfully advanced from Round 1 to Round 2 and was one of the finalists for the third-round candidates for digital signature algorithms other than CRYSTALS-DILITHIUM [
17] and FALCON [
18] whereas, Classic McEliece [
19], CRYSTALS-Kyber [
20], NTRU [
21] and SABER [
22] are the finalists for encryption algorithms. In 2020, Beullens [
23] proposed two new attacks on Rainbow; the intersection attack which also works on the UOV scheme and the rectangular MinRank attack. Both attacks greatly reduce the key recovery cost and in consequence, the parameter sets fail to meet the security requirements set out by NIST. Additionally, another Beullens’ key recovery attack that completely breaks the Rainbow scheme on security SL1 disqualified it from making it to Round 4 [
24]. Despite the total break of the Rainbow scheme, Cartor et al. [
25] suggested adding an internal perturbation modifier in order to mend the scheme and make it secure again.
2. Related Works
The concept of an equivalent public key was first introduced in [
26] where they generalized equivalent keys to increase the efficiency of algebraic key recovery attacks. [
27] implemented the concept of an equivalent public key to give a detailed security analysis of their proposed encryption scheme. Furthermore, [
28] showed that the algebraic system of an EFC public key has lower degree equations during the Gröbner basis computation compared to a random system having the same size. Consequently, solving the algebraic system of an EFC public key becomes simpler and easier.
We aim to construct the weakened multivariate signature schemes by focusing on generating the public–private key pair of which its vulnerability is only known to the RCA. The public key system of multivariate signature schemes will be constructed by inducing some weaknesses but still inherits randomness. Furthermore, we put forward strategies to identify them so that the users could conduct due diligence upon receiving the key pair.
In this work, we provide three potential methodologies that could be executed by an RCA which will expose UOV and Rainbow signature schemes to forgery. All three methodologies are able to forge the UOV signature scheme, whilst the Rainbow signature scheme is only vulnerable to one methodology. We also discuss the reason why the Rainbow signature scheme is secure against the first and second forgery mechanisms. In addition, we provide two strategies to identify whether the public key of UOV and Rainbow signature schemes obtained from a potential RCA, has the potential to be utilized to forge signatures. Consequently, the users of the UOV and Rainbow signature schemes can refuse to use the key pairs from the RCA.
The layout of the paper is structured as follows. In
Section 3, we summarize the UOV and Rainbow signature schemes.
Section 4 summarizes the three forgery mechanisms denoted by DSFM1, DSFM2 and DSFM3. We also discuss methods to identify whether one is provided weak parameters via DSFM1 and DSFM2 methodologies. Moreover, in
Section 5, we present our main results which show that the UOV scheme is vulnerable against the mentioned forgery mechanisms. We also provide examples for illustrative purposes. Moving on to
Section 6, we discuss the reason why the Rainbow scheme is not vulnerable to DSFM1 and DSFM2. Next, we show that both UOV and Rainbow schemes are vulnerable against DSFM3 in
Section 7.
Section 8 provides the discussion from our work for comprehensive understanding. Finally, we conclude our work in
Section 9.
3. Multivariate Signature Schemes
In this section, we show the key generation, signing and verification processes of two multivariate signature schemes, namely the UOV and Rainbow signature schemes.
The UOV signature scheme can be described as follow.
3.1. UOV Digital Signature
Let be a finite field with q elements. The number of equations is equal to o and the number of variables is equal to where . Let and be known as the Vinegar variables and known as the Oil variables.
Key Generation: Choose an affine map
and a central map
which consists of
o quadratic polynomials
of the form
The private key consists of the two maps and , whereas the public key is the composed map consisting of o quadratic polynomials in n variables.
Signature Generation: To generate a signature z for a document d, one uses a hash function to compute the hash value and perform the following steps.
Signature Verification: To check if is indeed a valid signature for the document d, one computes and computes . If holds, the signature z is accepted, otherwise rejected.
Next, we describe the Rainbow signature scheme as follows.
3.2. Rainbow Digital Signature
Key Generation: Let be a finite field with q elements. Let be integers such that and define the sets of integers for We set and for . We have .
The central map
consists of
polynomials
of the form
where
ℓ is the only integer such that
.
To hide the structure of in the public key, one composes it with two invertible affine maps and . Hence, the public key has the form , the private key consists of the three maps and .
The following Algorithm 1 is to compute the inversion of the Rainbow central map.
Algorithm 1 Inversion of the Rainbow central map. |
Input: Rainbow central map , vector x Output: Vector with . Choose random values for the variables and substitute them into the polynomials . for to u do Perform Gaussian Elimination on the polynomials to get the values of the variables . Substitute the values of into the polynomials . end for
|
Signature Generation: To generate a signature for a message d, one uses a hash function to compute the hash value and perform the following steps.
Compute .
Compute a pre-image of x under the central map . This is done utilizing Algorithm 1.
Compute the signature by .
Signature Verification: To check, if is indeed a valid signature for the document d, one computes and computes . If holds, the signature z is accepted, otherwise rejected.
4. Novel Forgery Mechanisms for Multivariate Signature Schemes
This section outlines two forgery mechanisms which were first made known to the public by our research group during The International Conference on Mathematical Sciences and Technology 2022 (MathTech 2022) [
29] namely the DSFM1 and DSFM2 mechanisms. We also provide another novel mechanism in this section, known as DSFM3. Upon executing these three methods on multivariate signature schemes, it would enable an adversary to forge signatures without the knowledge of
.
4.1. Digital Signature Forgery Mechanism 1 (DSFM1)
In this subsection, a public key system which is generated by DSFM1 would enable forgery by those who know about it. The DSFM1 would result in polynomials in to be multiples of each other. As such, one needs to solve only one of the polynomials . This is due to the fact that a vector which satisfies also satisfies the other polynomials in the same system .
4.1.1. Generating DSFM1 Induced System of Equations
The following Algorithm 2 induces DSFM1 weaknesses on a system of equations.
Algorithm 2 Digital Signature Forgery Mechanism 1 |
Input: Integer q. Output: Public key system over . |
4.1.2. Identifying DSFM1
The user can check whether the public key system
received is a forgeable system via DSFM1 or not by utilizing the following Algorithm 3.
Algorithm 3 Identifying DSFM1 |
Input: The system ) of multivariate quadratic polynomials over Output: is a forgeable system for to m do where and are the coefficients of polynomial and , respectively. If where , then is a forgeable system. end for return
|
4.2. Digital Signature Forgery Mechanism 2 (DSFM2)
In this subsection, a public key system which is generated by DSFM2 would enable forgery by those who know about it. The DSFM2 would result in polynomials in to be summations of each other. As such, one needs to solve only two of the polynomials and where . This is due to the fact that a vector which satisfies and also satisfies the other polynomials in the same system .
4.2.1. Generating DSFM2 Induced System of Equations
The following Algorithm 4 induces DSFM2 weaknesses in a system of equations.
Algorithm 4 Digital Signature Forgery Mechanism 2 |
Input: Integer q. Output: Public key system over . Choose two secret invertible affine maps and . Choose a secret central map . Compute to output two equations and . For , set where and . Publish as public key over .
|
4.2.2. Identifying DSFM2
The user can check whether the public key system
received is a forgeable system via DSFM2 or not by utilizing the following Algorithm 5.
Algorithm 5 Identifying DSFM2 |
Input: The system ) of multivariate quadratic polynomials over Output: is a forgeable system |
4.3. Digital Signature Forgery Mechanism 3 (DSFM3)
In this subsection, we discuss the method to forge multivariate signature schemes without having to alter the construction of the public key system . This is due to the fact that if an adversary successfully solicits x from an RCA and solves for some , the adversary can forge the signature corresponding to the hash value .
Generating DSFM3 Forged Signature
The following Algorithm 6 explains DSFM3.
Algorithm 6 Digital Signature Forgery Mechanism 3 |
Input: Public key , x such that and w Output: Signature z’ such that Compute where is an unknown variable. Solve m equations in the single variable such that . Set .
|
In Steps 1 and 2, computing and solving would reduce the number of unknowns from n variables to only one variable. Instead of solving m equations in n variables, the adversary only needs to solve m univariable equations which is much easier.
5. Generating Weak UOV Signature Scheme
In this section, we show how a weak UOV signature scheme is generated by RCA from DSFM1 and DSFM2.
5.1. Generating Weak UOV Signature Scheme by DSFM1
From DSFM1, we put forward an algorithm to generate a weak UOV public key. In other words, we set up the UOV public key which is
, where all of its polynomials satisfy the original form and also can be written into multiples of each other. The following Algorithm 7 explains the key generation of weak UOV signature scheme by DSFM1.
Algorithm 7 Key Generation of Weak UOV Signature Scheme by DSFM1 |
Input: Integers o and v such that and . Let and Let be the Vinegar variables and be the Oil variables. Output: Public key in the form of for Choose a random invertible affine map . Choose a random polynomial of the form
and for compute where . Set the central map . Compute . The system consists of o quadratic polynomials in n variables.
|
To pass through the verification, the vectors in
must be multiple to each other, otherwise the verification fails. This is because, the polynomials in public key system
and the central map
are of the form
and
, respectively. The following Algorithm 8 explains the signature generation of weak UOV signature scheme by DSFM1.
Algorithm 8 Signature Generation of Weak UOV Signature Scheme by DSFM1 |
Input: Document d Output: Signature z Compute such that . Find a pre-image of w under the central map .
Choose random values for the Vinegar variables and substitute them into the polynomials . Choose the resulting linear system of o equations in the o Oil variables by Gaussian elimination. If the system does not have a solution, choose other values for the vinegar variables and try again.
Compute the signature by .
|
The signature verification of the UOV signature scheme generated by DSFM1 as in Algorithm 9 below works the same as the original UOV.
Algorithm 9 Signature Verification of Weak UOV Signature Scheme by DSFM1 |
Input: Public key , document d and signature z Output: Accept or reject signature Compute Compute If holds, the signature z is accepted, otherwise rejected.
|
In the following example, we illustrate the generation of a weak UOV scheme via the DSFM1 methodology as well as the signing and verification process. The example below shows that a weak UOV scheme can still be used by a user without suspicion since the constants seem randomized and the signing and verification work as normal.
Example 1. We will discuss key generation, signing and verification on .
Key Generation: We choose , which will lead to a public key of 3 quadratic equations in 8 variables. The private key consists of the affine map .and the central map is given by polynomials We compute the public key by , which results in Signature Generation: In order to generate a signature for the message , we first need to compute We choose random values for the Vinegar variables and substitute them into the polynomials and . Thus, we obtain a linear system in the Oil variables and of the form By Gaussian elimination, this system has the solution . Attaching the Vinegar variables yields Finally, we computeto obtain a signature for the messagew.
Signature Verification: In order to check ifzis indeed a valid signature for the messagew, we compute Since holds, the signature is accepted.
5.1.1. A Weakened DSFM1 UOV Signature Scheme Forgery Methodology
The algorithm to forge the signature of a weak UOV scheme by DSFM1 is described in Algorithm 10 as below.
Algorithm 10 Forgery of Weakened DSFM1 UOV Signature Scheme |
Input: Public key , document d Output: Signature z’ such that |
Since , solving one of the polynomials would solve the whole system .
In the following example, we show how an impersonator successfully forge the signature of a weakened DSFM1 UOV scheme.
Example 2. Given the public key of a weakened DSFM1 UOV scheme as in Example 1: Letw. The impersonator computes where . Then, to solve , he chooses random variables and substitutes them into which results a quadratic equation with one variable Since this equation has two solutions and 5 hence the solution for are and . These solutions are also the solutions to and , which implies where or are the forged signatures. Indeed both
5.1.2. Identifying a Weakened DSFM1 UOV Scheme
We can directly use Algorithm 3 to identify a weakened DSFM1 UOV scheme.
Example 3. Given the public key of a weakened DSFM1 UOV scheme as in Example 1: To identify is a forgeable system, we choose one coefficient from and and compute Sinceis true, we have successfully identified that is a forgeable system. 5.2. Generating Weak UOV Signature Scheme by DSFM2
From DSFM2, we put forward an algorithm to generate a weak UOV public key. In other words, we set up the UOV public key, which is
, where all its polynomials satisfy the original form and also can be written into summation of two polynomials from the same system. The following Algorithm 11 explains the key generation of weak UOV signature scheme by DSFM2.
Algorithm 11 Key Generation of Weak UOV Signature Scheme by DSFM2 |
Input: Integers o and v such that and . Let and Let be the Vinegar variables and be the Oil variables. Output: Public key in the form of for , and . Choose a random invertible affine map . Choose a random polynomial and of the form
For compute where and . Set the central map . Compute . The system consists of o quadratic polynomials in n variables.
|
To pass through the verification, the vectors in
must be of the form
, otherwise the verification fails. This is because, the polynomials in public key system
and the central map
are of the form
and
, respectively. The following Algorithm 12 explains the signature generation of weak UOV signature scheme by DSFM2.
Algorithm 12 Signature Generation of Weak UOV Signature Scheme by DSFM2 |
Input: Document d Output: Signature z Compute such that for , , . Find a pre-image of w under the central map .
Choose random values for the Vinegar variables and substitute them into the polynomials . Choose the resulting linear system of o equations in the o Oil variables by Gaussian elimination. If the system does not have a solution, choose other values for the vinegar variables and try again.
Compute the signature by .
|
The signature verification of the UOV signature scheme generated by DSFM1 as in Algorithm 13 below works the same as the original UOV.
Algorithm 13 Signature Verification of Weak UOV Signature Scheme by DSFM2 |
Input: Public key , document d and signature z Output: Accept or reject signature Compute . Compute . If holds, the signature z is accepted, otherwise rejected.
|
In the following example, we illustrate the generation of a weak UOV scheme via the DSFM2 methodology as well as the signing and verification process. The example below shows that a weak UOV scheme can still be used by a user without suspicion since the constants seem randomized and the signing and verification work as normal.
Example 4. We will discuss key generation, signing and verification on .
Key Generation: We choose , and , which will lead to a public key of 3 quadratic equations in 8 variables. The private key consists of the affine map .and the central map is given by polynomials We compute the public key by , which results in Signature Generation: In order to generate a signature for the message , we first need to compute We choose random values for the Vinegar variables and substitute them into the polynomials , and . Thus, we obtain a linear system in the Oil variables and of the form By Gaussian elimination, this system has the solution . Attaching the Vinegar variables yields Finally, we computeto obtain a signature for the messagew.
Signature Verification: In order to check ifzis indeed a valid signature for the messagew, we compute Since holds, the signature is accepted.
5.2.1. A Weakened DSFM2 UOV Signature Scheme Forgery Methodology
The algorithm to forge the signature of a weak UOV scheme by DSFM2 is described in Algorithm 14 as below.
Algorithm 14 Forgery of Weakened DSFM2 UOV Signature Scheme |
Input: Public key , document d Output: Signature z’ such that Solve and where , and obtain .
|
Since , solving the two polynomials and would solve the whole system .
In the following example, we show how an impersonator successfully forge the signature of a weakened DSFM2 UOV scheme.
Example 5. Given the public key of a weakened DSFM2 UOV scheme as in Example 4: Letw. The impersonator computes where . Then, to solve , he chooses random variables and substitutes them into and which results quadratic equations with one variable Since these equations has a solution hence the solution for and are . This solution is also the solution to and , which implies where is the forged signature. Indeed
5.2.2. Identifying a Weakened DSFM2 UOV Scheme
We can directly use Algorithm 5 to identify a weakened DSFM2 UOV scheme.
Example 6. Given the public key of a weakened DSFM2 UOV scheme as in Example 4: To identify is a forgeable system, we take two polynomials and and compute Sincewe have successfully identified that is a forgeable system. 6. The Inability to Generate Weak Rainbow Signature Scheme via DSFM1 and DSFM2 Methodologies
Firstly, we observe that the central map
of a UOV scheme in the form of
Thus, all polynomials where and where and in the central map are of the same form as above.
Thus, the inability to generate a weak Rainbow signature scheme via DSFM1 and DSFM2 methodologies is because of its central map
having the form of
The form of polynomials are different depending on the ℓ-th level. As we can see, the index i and j for the variables are from the index sets and where ℓ is the only integer such that . For instance, when , we will have and . The value of k is taken from the set . Therefore, the polynomials will share the same form. For , and where , the polynomials are of the same form. Since the polynomials have different variable forms, we cannot construct the central map as in Algorithm 2 and the polynomials in of the form as in Algorithm 4.
7. Generating Weak UOV and Rainbow Signature Scheme
In the following example, we illustrate the generation of weak UOV and Rainbow schemes via DSFM3 methodology as well as the signing and verification process. Firstly, the public–private key pair of either UOV or Rainbow is generated as in the original version of the schemes. Secondly, suppose the RCA computes such that and shares the vector with the adversary. The adversary can forge the signature via DSFM3. The example below shows that weak UOV and Rainbow schemes can still be used by a user without suspicion since the constants seem randomized and the signing and verification work as normal.
Example 7. Let be a valid public key over that can be utilized for both UOV and Rainbow signature schemes. Suppose such that . The adversary is given the integer set from the RCA and suppose the adversary wants to forge the signaturez corresponding to . The adversary computes and obtains Solving , and , the adversary will obtain . Therefore, is the forged signature. Indeed The verification process will be successful since: 8. Discussion
Our work enabled us to showcase the practicality of the DSFM1, DSFM2 and DSFM3 methodologies to forge UOV and Rainbow signatures. The strategies outlined to identify whether DSFM1 or DSFM2 was applied on UOV and Rainbow parameters must be adhered to in order to ensure the security of the signature. As discussed on [
29], the complexity to conduct due diligence are
and
, respectively, where
m is the number of equations. However, to this end, it is still unanswered whether there are possible mechanisms to identify DSFM3 weakened systems. The DSFM3 is deployed on random polynomials, and does not involve modification on polynomials to make it vulnerable. As such, the system
has no anomalies. Instead, the adversary only needs to solicit the vector
x which satisfies
from the RCA.
9. Conclusions
In conclusion, we have revisited two signature forgery methodologies (DSFM1 and DSFM2) and put forward one novel signature forgery methodology, DSFM3. The public key system of a UOV signature scheme is not secure if it is generated using DSFM1, DSFM2 and DSFM3 methodologies by RCA. Potential users of the UOV signature scheme are able to identify whether the public parameters are generated via DSFM1 and DSFM2 methodologies. As such they must conduct due diligence upon receiving the public key system . To this end, the Rainbow signature scheme is resistant to DSFM1 as well as DSFM2 methodologies and is only vulnerable to the DSFM3 methodology. However, it is still an open question whether a public key system of UOV and Rainbow signature schemes can be identified if it is generated via DSFM3 methodology since there are no anomalies in the public key.
Author Contributions
Conceptualization, N.A.S.A.J., M.R.K.A., S.H.S. and K.A.; Formal analysis, N.A.S.A.J. and M.R.K.A.; Funding acquisition, M.R.K.A.; Investigation, N.A.S.A.J., M.R.K.A., S.H.S. and K.A. Methodology, N.A.S.A.J. and M.R.K.A.; Project administration, M.R.K.A.; Supervision, M.R.K.A. and S.H.S.; Validation, M.R.K.A.; Visualization, N.A.S.A.J., M.R.K.A., S.H.S. and K.A.; Writing—original draft, N.A.S.A.J.; Writing—review & editing, M.R.K.A. All authors have read and agreed to the published version of the manuscript.
Funding
The research was supported by Ministry of Education of Malaysia with Fundamental Research Grant Scheme (FRGS/1/2019/STG06/UPM/02/8). It is also partially supported by Mediterranea Universiti of Reggio Calabria (UNIRC) Research Grant (UPM/INSPEM/700-3/1/GERANANTARABAN GSA/6380 073122-10065).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
The first author would like to further express appreciation to the Institute for Mathematical Research (INSPEM), Universiti Putra Malaysia (UPM), and Ministry of Higher Education (MOHE) for giving the opportunity to conduct this research.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
CA | Certificate Authority |
DSFM1 | Digital Signature Forgery Mechanism 1 |
DSFM2 | Digital Signature Forgery Mechanism 2 |
DSFM3 | Digital Signature Forgery Mechanism 3 |
DLP | Discrete Logarithm Problem |
IFP | Integer Factorization Problem |
MQP | Multivariate Quadratic Problem |
RCA | Rogue Certificate Authority |
RSA | Rivest-Shamir-Adleman |
UOV | Unbalance Oil and Vinegar |
References
- Dong, Z.; Kane, K.; Camp, L.J. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Trans. Priv. Secur. 2016, 19, 1–31. [Google Scholar] [CrossRef] [Green Version]
- Shor, P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 1999, 41, 303–332. [Google Scholar] [CrossRef]
- Rivest, R.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef] [Green Version]
- Diffie, W.; Hellman, M. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef] [Green Version]
- Ding, J.; Petzoldt, A. Current state of multivariate cryptography. IEEE Secur. Priv. 2017, 15, 28–36. [Google Scholar] [CrossRef]
- Kipnis, A.; Patarin, J.; Goubin, L. Unbalanced oil and vinegar signature schemes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; Springer: Berlin/Heidelberg, Germany, 1999; pp. 206–222. [Google Scholar]
- Patarin, J. The oil and vinegar signature scheme. In Proceedings of the Dagstuhl Workshop on Cryptography, Saarbrucken, Germany, 22–26 September 1997. [Google Scholar]
- Kipnis, A.; Shamir, A. Cryptanalysis of the oil and vinegar signature scheme. In Proceedings of the 18th Annual International Cryptology Conference, Santa Barbara, CA, USA, 23–27 August 1998; Springer: Berlin/Heidelberg, Germany, 1998; pp. 257–266. [Google Scholar]
- Ding, J.; Schmidt, D. Rainbow, a new multivariable polynomial signature scheme. In Proceedings of the International Conference on Applied Cryptography and Network Security, New York, NY, USA, 7–10 June 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 164–175. [Google Scholar]
- Beullens, W.; Preneel, B. Field lifting for smaller UOV public keys. In Proceedings of the International Conference on Cryptology in India, Chennai, India, 10–13 December 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 227–246. [Google Scholar]
- Petzoldt, A. Efficient key generation for rainbow. In Proceedings of the International Conference on Post-Quantum Cryptography, Paris, France, 15–17 April 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 92–107. [Google Scholar]
- Li, J.; Hu, Z.; Kais, S. Practical quantum encryption protocol with varying encryption configurations. Phys. Rev. Res. 2021, 3, 023251. [Google Scholar] [CrossRef]
- Feng, Y.; Zhou, J.; Li, J.; Zhao, W.; Shi, J.; Shi, R.; Li, W. SKC-CCCO: An encryption algorithm for quantum group signature. Quantum Inf. Process. 2022, 21, 1–29. [Google Scholar] [CrossRef]
- Shi, J.; Lu, Y.; Feng, Y.; Huang, D.; Lou, X.; Li, Q.; Shi, R. A quantum hash function with grouped coarse-grained boson sampling. Quantum Inf. Process. 2022, 21, 1–17. [Google Scholar] [CrossRef]
- Shi, J.; Chen, S.; Lu, Y.; Feng, Y.; Shi, R.; Yang, Y.; Li, J. An approach to cryptography based on continuous-variable quantum neural network. Sci. Rep. 2020, 10, 2107. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Feng, Y.; Shi, R.; Shi, J.; Zhao, W.; Lu, Y.; Tang, Y. Arbitrated quantum signature protocol with boson sampling-based random unitary encryption. J. Phys. A Math. Theor. 2020, 53, 135301. [Google Scholar] [CrossRef]
- Lyubashevsky, V.; Ducas, L.; Kiltz, E.; Lepoint, T.; Schwabe, P.; Seiler, G.; Stehlé, D.; Avanzi, R.; Bos, J.; Schanck, J. CRYSTALS-Dilithium. In Submission to the NIST Post-Quantum Cryptography Standardization [NIS]; NIST: Gaithersburg, MD, USA, 2007; pp. 1–29. [Google Scholar]
- Fouque, P.A.; Hoffstein, J.; Kirchner, P.; Lyubashevsky, V.; Pornin, T.; Prest, T.; Ricosset, T.; Seiler, G.; Whyte, W.; Zhang, Z. Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Submiss. NIST Post-Quantum Cryptogr. Stand. Process. 2018, 36, 1–75. [Google Scholar]
- Bernstein, D.J.; Chou, T.; Lange, T.; von Maurich, I.; Misoczki, R.; Niederhagen, R.; Persichetti, E.; Peters, C.; Schwabe, P.; Sendrier, N.; et al. Classic McEliece: Conservative code-based cryptography. In Proceedings of the PQCRYPTO Mini-School and Workshop, Taipei, Taiwan, 27–29 June 2018. [Google Scholar]
- Bos, J.; Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schanck, J.M.; Schwabe, P.; Seiler, G.; Stehlé, D. CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM. In Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, 24–26 April 2018; pp. 353–367. [Google Scholar]
- Chen, C.; Danba, O.; Hoffstein, J.; Hülsing, A.; Rijneveld, J.; Schanck, J.M.; Schwabe, P.; Whyte, W.; Zhang, Z. Algorithm Specifications and Supporting Documentation; Brown University: Providence, RI, USA; Onboard Security Company: Wilmington, DE, USA, 2019. [Google Scholar]
- D’Anvers, J.P.; Karmakar, A.; Sinha Roy, S.; Vercauteren, F. Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. In Proceedings of the International Conference on Cryptology in Africa, Marrakesh, Morocco, 7–9 May 2018; Springer: Cham, Switzerland, 2018; pp. 282–305. [Google Scholar]
- Beullens, W. Improved cryptanalysis of UOV and rainbow. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 17–21 October 2021; Springer: Cham, Switzerland, 2021; pp. 348–373. [Google Scholar]
- Beullens, W. Breaking rainbow takes a weekend on a laptop. Cryptol. ePrint Arch. 2022, 214. [Google Scholar]
- Cartor, R.; Cartor, M.; Lewis, M.; Smith-Tone, D. IPRainbow. In Proceedings of the International Conference on Post-Quantum Cryptography, Virtual, 28–30 September 2022; Springer: Cham, Switzerland, 2022; pp. 170–184. [Google Scholar]
- Thomae, E.; Wolf, C. Cryptanalysis of enhanced TTS, STS and all its variants, or: Why cross-terms are important. In Proceedings of the International Conference on Cryptology in Africa, Ifrane, Morocco, 10–12 July 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 188–202. [Google Scholar]
- Chen, J.; Ning, J.; Ling, J.; Lau, T.S.C.; Wang, Y. A new encryption scheme for multivariate quadratic systems. Theor. Comput. Sci. 2020, 809, 372–383. [Google Scholar] [CrossRef]
- Chakraborty, O.; Faugére, J.C.; Perret, L. Cryptanalysis of the extension field cancellation cryptosystem. Des. Codes Cryptogr. 2021, 89, 1335–1364. [Google Scholar] [CrossRef]
- Jamal, N.A.S.A.; Ariffin, M.R.K.; Sapar, S.H.; Abdullah, K. Novel Forgery Mechanisms in Multivariate Signature Schemes; Institute for Mathematical Research, Universiti Putra Malaysia: Serdang, Malaysia, 2022. [Google Scholar]
| Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).