TU Darmstadt / ULB / TUbiblio

Linear Recurring Sequences for the UOV Key Generation Revisited

Petzoldt, Albrecht and Bulygin, Stanislav (2012):
Linear Recurring Sequences for the UOV Key Generation Revisited.
In: The 15th Annual International Conference on Information Security and Cryptology (ICISC 2012), Springer 2013, Seoul, Korea, In: Lecture Notes in Computer Science, ISBN 978-3-642-37681-8,
[Conference or Workshop Item]

Abstract

Multivariate cryptography is one of the main candidates to guarantee the security of communication in a post quantum era. While multivariate signature schemes are very fast and require only modest computational resources, the key sizes of such schemes are quite large. Earlier Petzoldt et al. proposed a way to use Linear Recurring Sequences (LRS's) for the key generation of the Unbalanced Oil and Vinegar (UOV) signature scheme by which they were able to reduce the public key size of this scheme by a factor of 7. In this paper we describe a modification of their scheme, which enables us not only to reduce the public key size, but also to speed up the verification process of the UOV scheme by a factor of 5.

Item Type: Conference or Workshop Item
Erschienen: 2012
Creators: Petzoldt, Albrecht and Bulygin, Stanislav
Title: Linear Recurring Sequences for the UOV Key Generation Revisited
Language: ["languages_typename_1" not defined]
Abstract:

Multivariate cryptography is one of the main candidates to guarantee the security of communication in a post quantum era. While multivariate signature schemes are very fast and require only modest computational resources, the key sizes of such schemes are quite large. Earlier Petzoldt et al. proposed a way to use Linear Recurring Sequences (LRS's) for the key generation of the Unbalanced Oil and Vinegar (UOV) signature scheme by which they were able to reduce the public key size of this scheme by a factor of 7. In this paper we describe a modification of their scheme, which enables us not only to reduce the public key size, but also to speed up the verification process of the UOV scheme by a factor of 5.

Title of Book: The 15th Annual International Conference on Information Security and Cryptology (ICISC 2012)
Series Name: Lecture Notes in Computer Science
Number: 7839
Publisher: Springer 2013
ISBN: 978-3-642-37681-8
Uncontrolled Keywords: Secure Data;Multivariate Cryptography, UOV Signature Scheme, Key Size Reduction, Fast Verification
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Department of Computer Science > Theoretical Computer Science - Cryptography and Computer Algebra
20 Department of Computer Science > Theoretical Computer Science - Cryptography and Computer Algebra > Post-Quantum Cryptography
LOEWE > LOEWE-Zentren
20 Department of Computer Science
LOEWE
Event Location: Seoul, Korea
Date Deposited: 30 Dec 2016 20:23
Identification Number: TUD-CS-2012-0229
Export:

Optionen (nur für Redakteure)

View Item View Item