JSIAM Letters
Online ISSN : 1883-0617
Print ISSN : 1883-0609
ISSN-L : 1883-0617
Articles
Key recovery attack on Circulant UOV/Rainbow
Yasufumi Hashimoto
Author information
JOURNAL FREE ACCESS

2019 Volume 11 Pages 45-48

Details
Abstract

UOV and Rainbow are multivariate signature schemes, which are known to be efficient and secure enough against known attacks under suitable parameter selections, and have been expected to be post-quantum cryptography. Recently, new variants of UOV and Rainbow, called Circulant UOV and Circulant Rainbow respectively, were proposed by Peng and Tang. In these variants, the signature generation is faster than the original schemes since circulant matrices appear in the process of signature generation. However, such circulant structures weaken the security. In this paper, we study the structures of these circulant variants and show that they are vulnerable against Kipnis-Shamir's attack.

Content from these authors
© 2019, The Japan Society for Industrial and Applied Mathematics
Previous article Next article
feedback
Top