Cryptography Reference
In-Depth Information
Kipnis-Shamir's attack on UOV [33,31] also finds (a part) of S with the com-
plexity O ( q n− 2 n 1 n 1 ).
In TTM [35] and TTS [46], G is given by a convolution of two (or more) STS
type special invertible non-linear maps. The current examples of TTS ( e.g. [46])
are special (sparse) versions of Rainbow. The advantages of TTS compared to
Rainbow are its eciency, faster signature generation and smaller sized G .
2.2
Variations of Basic
G
Several variations have been proposed to enhance the security of the basic
schemes given in the previous subsection. We now describe the major ones.
2.2.1
)” and “Plus( + )”
The “minus” method is given by removing several polynomials in G .If G ( x ):=
( g 1 ( x ) ,
“Minus(
···
,g m ( x )) t , the central map G : k n
k n−u ( u<m )of“minus”is
G ( x ):=( g 1 ( x ) ,
···
,g m−u ( x )) ,
(12)
namely the polynomials g m−u +1 ( x ) ,
,g m ( x ) are hidden in the “minus”. This
is used for signature schemes. The signature generation process is as follows. For
a message y
···
k m−u ,choose r
k u
randomly. The signature is then generated
by
x = S 1 ( G 1 ( T 1 ( y ) ,r )) .
This is usually used in the BF type, because the “minus” of STS is also described
as the STS type. MI
[41,21] are examples of the “minus” of
BF type. Note that Sflash [1] is a further modification of MI
,HFE
and l IC
.Byremoving u
polynomials in G , they prevents the attacks on the original schemes. However,
a differential attack recover the hidden polynomials in MI
and Sflash [26,22].
The “plus” method is given by adding several polynomials, namely the central
map of “plus” is G + =( g 1 ( x ) ,
1isa
small integer and h l is a randomly chosen quadratic forms. The decryption is
about q r times slower than the original one. Note that the security of MI
···
,g m ( x ) ,h 1 ( x ) ,
···
,h u 1 ( x )) where u 1
±
(the
“plus” of MI
) is still open (further discussed by Patarin et al. [41]).
2.2.2 “Vinegar”
The “vinegar” method is given by adding several variables. For the original
scheme G ( x ):=( g 1 ( x ) ,
···
,g m ( x )) with
a ij x i x j +
1 ≤i≤n
g l ( x ):=
b i x i + c,
1 ≤i≤j≤n
the “vinegar” G v ( x ):=( g 1 ( x ) ,
···
,g m ( x )) is given by
a ij x i x j +
1
v ( l )
i
,x n + u ) x i + w ( l )
g l ( x ):=
( x n +1 ,
···
( x n +1 ,
···
,x n + u ) ,
i
1
≤i≤j≤n
≤i≤n
 
Search WWH ::




Custom Search