2019
DOI: 10.3906/mat-1803-92
|View full text |Cite
|
Sign up to set email alerts
|

A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials

Abstract: Identification schemes are used to verify identities of parties and signatures. Recently, systems based on multivariate polynomials have been preferred in identification schemes due to their resistance against quantum attacks. In this paper, we propose a quantum secure 3-pass identification scheme based on multivariate quadratic polynomials. We compare the proposed scheme with the previous ones in view of memory requirements, communication length, and computation time. We define an efficiency metric by using i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Thus, we do not have numeric parameters for any security level. However, the comparison is provided by identification schemes based on multivariate quadratic or cubic polynomials presented in [19,21,23] with curve-based cryptoGPS [26]. In Table 2, for 80-bit security level, the comparison is given by considering security attacks against quantum attacks, impersonation probability and parameter set including secret key, challenge and response sizes.…”
Section: A Novel Methods For Polar Form Of Multivariate Polynomialsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, we do not have numeric parameters for any security level. However, the comparison is provided by identification schemes based on multivariate quadratic or cubic polynomials presented in [19,21,23] with curve-based cryptoGPS [26]. In Table 2, for 80-bit security level, the comparison is given by considering security attacks against quantum attacks, impersonation probability and parameter set including secret key, challenge and response sizes.…”
Section: A Novel Methods For Polar Form Of Multivariate Polynomialsmentioning
confidence: 99%
“…In addition, all identification schemes based on multivariate polynomials were compared in view of memory requirements, communication length, and computation time. In [23], a new identification scheme based on multivariate quadratic polynomials was presented by using a different dividing technique of the secret key. Then, the proposed identification scheme was transformed to the signature scheme.…”
Section: Introductionmentioning
confidence: 99%
“…In order to be consistent with (27), we optimally choose v 1 ≤ 1.3 ⋅ o 2 . Plugging each m min = 34, 44, 68, 94 into (21), (22), and (23) and requires that they are larger than 2 100 , 2 128 , 2 192 and 2 256 , respectively, we optimally obtain log(q) = 5.…”
Section: Choice Of Subfield and Parametersmentioning
confidence: 99%
“…However, the soundness error of that 3-pass ID is 2/3, which is large and hence one needs to repeat the protocol many times to reach a desized security level, which results in a large signature. There have been several improvements in 3-pass ID such as [21,22] which reduce the soundness error to 1/2. However, the communication of the protocols is also increased, which make the resulting signature still large.…”
Section: Introductionmentioning
confidence: 99%
“…MPKC has high computational efficiency and can realize strong secure communication on low-end devices. Signature and encryption schemes based on MPKC are widely studied [15]- [18]. At present, there is no certificateless broadcast multisignature scheme based on MPKC.…”
Section: Introductionmentioning
confidence: 99%