Algebraic cryptanalysis of yasuda, takagi and sakurai’s signature scheme

Wenbin Zhang*, Chik How Tan

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

1 Citation (Scopus)

Abstract

Recently Yasuda, Takagi and Sakurai proposed a new and interesting signature scheme from the classification of quadratic forms over finite fields of odd characteristic published in PQCrypto 2013. In this paper we propose two algebraic attacks to their scheme using only linear algebra. Both attacks are motivated by Kipnis and Shamir’s attack to the oil-vinegar signature scheme. Namely we first turn the original problem to a geometric problem and then apply the theory of invariant subspace intensively. We show that Yasuda, Takagi and Sakurai’s scheme can be broken by our attacks with complexity O{formal presented} where m is the number of variables and q is the size of the base field. Here d is expected generally to be 1 and is confirmed in our tests. We also compare our attacks with Y. Hashimoto’s attack which is just published in PQCrypto 2014.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2014 - 17th International Conference, Revised Selected Papers
EditorsJongsung Kim, Jooyoung Lee
PublisherSpringer Verlag
Pages53-66
Number of pages14
ISBN (Electronic)9783319159423
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event17th International Conference on Information Security and Cryptology, ICISC 2014 - Seoul, Korea, Republic of
Duration: 3 Dec 20145 Dec 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8949
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference17th International Conference on Information Security and Cryptology, ICISC 2014
Country/TerritoryKorea, Republic of
CitySeoul
Period3/12/145/12/14

Keywords

  • Multivariate public key cryptosystem
  • Post-quantum cryptography
  • Quadratic form

Fingerprint

Dive into the research topics of 'Algebraic cryptanalysis of yasuda, takagi and sakurai’s signature scheme'. Together they form a unique fingerprint.

Cite this