2019
DOI: 10.2197/ipsjjip.27.517
|View full text |Cite
|
Sign up to set email alerts
|

Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017

Abstract: One of the most efficient post-quantum signature schemes is Rainbow whose hardness is based on the multivariate quadratic polynomial (MQ) problem. ELSA, a new multivariate signature scheme proposed at Asiacrypt 2017, has a similar construction to Rainbow. Its advantages, compared to Rainbow, are its smaller secret key and faster signature generation. In addition, its existential unforgeability against an adaptive chosen-message attack has been proven under the hardness of the MQ-problem induced by a public key… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…However, as described in §4, such circulant structures weaken the security critically, especially against Kipnis-Shamir's attack [4,9]. This situation is similar to ELSA, another fast variant of Rainbow proposed at Asiacrypt 2017 [16] and broken at IWSEC 2018 [17]. We thus consider that we must study the security quite carefully when we attempt to improve the efficiency of these schemes.…”
Section: Resultsmentioning
confidence: 89%
“…However, as described in §4, such circulant structures weaken the security critically, especially against Kipnis-Shamir's attack [4,9]. This situation is similar to ELSA, another fast variant of Rainbow proposed at Asiacrypt 2017 [16] and broken at IWSEC 2018 [17]. We thus consider that we must study the security quite carefully when we attempt to improve the efficiency of these schemes.…”
Section: Resultsmentioning
confidence: 89%
“…[3,[6][7][8][9]. Unfortunately, some of them are much less secure than expected, since the special structures in these arrangements for reducing the keys yield vulnerabilities [10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%