Cryptography Reference
In-Depth Information
Signature Generation
Let M
) n− 1 be a message. We compute A = A 1 ( M ), B = G 1 ( A )and
C = A 2 ( B ) in the same order. The signature of the message is C
(
Z
/N
Z
) n .
(
Z
/N
Z
Here, G 1 ( A ) represents an element of the preimage of A .
Verificat ion
If F ( C )= M then the signature is accepted, otherwise it is rejected.
2.1
Attack against Birational Permutation Scheme
It is believed that solving general equations over
is more dicult than
doing so over a finite field. The security of Birational Permutation scheme was
based on the diculty of solving the problem over
Z
/N
Z
. However, Coppersmith,
Stern and Vaudenary gave an ecient algorithm [5] to compute A 2 ,apartof
the secret key, without solving equations over
Z
/N
Z
.
For simplicity, assume that A 2 are linear transformations. We write A, B for
the matrix expression of the linear parts of A 1 ,A 2 , respectively, and g k ,f k ( k =
2 , 3 ,...,n ) are denoted by
Z
/N
Z
g k ( x )= x T G k x ,
k = x T F k x
( x =( x 1 ,...,x n ) T ) ,
(2)
for some F k ,G k M
( n,
Z
/N
Z
). ( T means the transpose operator.) Since
a kl x T B T G j B x = x T B T n
B x
n
f k ( x )=
a kl G l
l =2
l =2
where A =( a kl ), we have
F k = B T n
B.
a kl G l
(3)
l =2
n , the determinant of l =2 a k 1 l G l
λ l =2 a k 2 l G j
For a variable λ and 1
k 1 ,k 2
λa k 2 n ) 2 . From (3), the determinant of F k 1
is factored by ( a k 1 n
λF k 2
is also
λa k 2 n ) 2 . Therefore a k 1 n /a k 2 n , which is denoted by λ 0 ,iscom-
puted by the public key. By calculating the kernel and the image of F k 1
factored by ( a k 1 n
λ 0 F k 2 ,
) n is decomposed as
(
Z
/N
Z
( Z /N Z ) n = B 1 ((
) n− 1
B 1 (
n− 1
Z
/N
Z
×{
0
}
)
{
0
}
×
(
Z
/N
Z
))
(4)
Continuing this operation, we finally arrive at a decomposition,
) n = B 1 ((
n−
1 )
B 1 (
n−
1
(
Z
/N
Z
Z
/N
Z
)
×{
0
}
⊕···⊕
{
0
}
×
(
Z
/N
Z
))
by subspaces with rank 1. By rewriting the public key on a basis of the above
decomposition, we obtain a system of equations with the same form as the central
map, and in this way, we can forge a signature.
 
Search WWH ::




Custom Search