2022 IEEE International Conference on Quantum Computing and Engineering (QCE) 2022
DOI: 10.1109/qce53715.2022.00067
|View full text |Cite
|
Sign up to set email alerts
|

Benchmark Performance of a New Quantum-Safe Multivariate Polynomial Digital Signature Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Previous work in this area mainly focused on the comparison between public key algorithms that are part of the NIST selection process [20,[38][39][40]. Such comparison needed to be made between algorithms that provide the same level of security, therefore, NIST has provided a collection of broad security strength categories as outlined in Table 3.…”
Section: ) Nist Security Level Definitionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Previous work in this area mainly focused on the comparison between public key algorithms that are part of the NIST selection process [20,[38][39][40]. Such comparison needed to be made between algorithms that provide the same level of security, therefore, NIST has provided a collection of broad security strength categories as outlined in Table 3.…”
Section: ) Nist Security Level Definitionsmentioning
confidence: 99%
“…There have been several studies in the literature aimed at evaluating the performance of proposed PQC algorithms. For example, the work in [40] used the toolkit SUPERCOP 3 to test the performance of key generation, signing, and verifying procedures of various digital signature schemes including two of the NIST finalists Dilithium and Falcon. A 16-core Intel Core i7-10700 clocked at 2.9GHz was used to run this toolkit.…”
Section: ) Performance Comparisonmentioning
confidence: 99%
“…Overall, the MPPK algorithm is a secure and efficient means of exchanging messages in a prime Galois field, relying on complex polynomial operations to ensure the confidentiality of communications [54].…”
Section: Multivariate Polynomial Public Key Digital Signature Schemementioning
confidence: 99%
“…Directly spoofing the signature These can be classified based on chosen-message, known-message, and key-only. There are two sub-categories in the chosen-message attack: direct-chosen and generic-chosen, depending on whether the adversary knows the public key [54]. If the adversary has access to the public key, they can use the direct-chosen technique to replace a message with the signer's signature with the one they prefer.…”
Section: Possible Security Attacks On Mppk/dsmentioning
confidence: 99%