Cryptography Reference
In-Depth Information
be regarded as a variation of Rainbow using a non-commutative ring. However,
if a non-commutative ring used in the proposed scheme is chosen by the group
ring associated to dihedral group, the speed of the signature generation can be
accelerated by about 50% in comparison with the corresponding Rainbow.
Note that the performance of our designed schemes depend upon the arith-
metic operation of adapted non-commutative rings. Therefore, we plan to find
a specific non-commutative ring for achieving high processing speeds within our
schemes.
Acknowledgements. This work partially supported by JST Strategic Japanese-
Indian Cooperative Programme on multidisciplinary Research Field, which com-
bines Information and Communications Technology with Other Fields. The first
author is supported by JST A-step feasibility study program, No.AS231Z03613A.
The authors would like to thank Jintai Ding and the anonymous reviewers for
their helpful comments on the draft manuscript.
References
1. Anshel, I., Anshel, M., Goldfeld, D.: An Algebraic Method for Public-Kkey Cryp-
tography. Math. Res. Lett. 6(3-4), 287-291 (1999)
2. Adleman, L.M., Estes, D.R., McCurley, K.S.: Solving bivariate quadratic congru-
ences in random polynomial time. Math. Comput. 48, 17-28 (1987)
3. Billet, O., Gilbert, H.: Cryptanalysis of Rainbow. In: De Prisco, R., Yung, M. (eds.)
SCN 2006. LNCS, vol. 4116, pp. 336-347. Springer, Heidelberg (2006)
4. Coppersmith, D.: Weakness in Quaternion Signatures. In: Wiener, M. (ed.)
CRYPTO 1999. LNCS, vol. 1666, pp. 305-314. Springer, Heidelberg (1999)
5. Coppersmith, D., Stern, J., Vaudenay, S.: The security of the birational permuta-
tion signature scheme. J. Cryptology 10, 207-221 (1997)
6. Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. In:
Advances in Information Security, vol. 25 (2006)
7. Ding, J., Schmidt, D.: Rainbow, a New Multivariable Polynomial Signature
Scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS,
vol. 3531, pp. 164-175. Springer, Heidelberg (2005)
8. Ding, J., Yang, B.-Y., Chen, C.-H.O., Chen, M.-S., Cheng, C.-M.: New Differential-
Algebraic Attacks and Reparametrization of Rainbow. In: Bellovin, S.M., Gennaro,
R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 242-257.
Springer, Heidelberg (2008)
9. Goubin, L., Courtois, N.T.: Cryptanalysis of the TTM Cryptosystem. In: Okamoto,
T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 44-57. Springer, Heidelberg
(2000)
10. Hashimoto, Y., Sakurai, K.: On construction of signature schemes based on bi-
rational permutations over noncommutative. Presented at the 1st International
Conference on Symbolic Computation and Cryptography (SCC 2008), held in Bei-
jing (April 2008). ePrint http://eprint.iacr.org/2008/340
11. Ko, K.H., Lee, S.-J., Cheon, J.H., Han, J.W., Kang, J.-S., Park, C.-S.: New Public-
Key Cryptosystem Using Braid Groups. In: Bellare, M. (ed.) CRYPTO 2000.
LNCS, vol. 1880, pp. 166-183. Springer, Heidelberg (2000)
 
Search WWH ::




Custom Search