2001
DOI: 10.1007/3-540-45682-1_24
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank

Abstract: Abstract.A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on factoring and discrete log, but still they are practical schemes based on NP-hard problems. Among them, the problem SD of decoding linear codes is in spite of some 30 years of research effort, still exponential. We study a more general problem called MinRank that generalizes SD and contains also other well known hard problems… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
49
0
1

Year Published

2006
2006
2018
2018

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(50 citation statements)
references
References 31 publications
0
49
0
1
Order By: Relevance
“…It has been proposed by Patarin [29] after his cryptanalysis [28] of the historical multivariate scheme C * [27]. In [26] Kipnis and Shamir proposed a key recovery attack on HFE, which reduces to the so-called MinRank [12] problem. Although the attack is not practical for the proposed parameters, it was conjectured to be sub-exponential.…”
Section: Introductionmentioning
confidence: 99%
“…It has been proposed by Patarin [29] after his cryptanalysis [28] of the historical multivariate scheme C * [27]. In [26] Kipnis and Shamir proposed a key recovery attack on HFE, which reduces to the so-called MinRank [12] problem. Although the attack is not practical for the proposed parameters, it was conjectured to be sub-exponential.…”
Section: Introductionmentioning
confidence: 99%
“…The problem of finding a low rank linear combination of matrices is a basic linear algebra problem [20] known as MinRank in cryptography [21]. The MinRank problem over a finite field F q is as follows.…”
Section: The Minrank Problemmentioning
confidence: 99%
“…The attacks on TTM [12], STS [13,14], Rainbow [15], HFE and MultiHFE [16,17,18,19] are all in essence based on the problem of finding a low rank linear combination of matrices, known as MinRank in cryptography [20]. This problem is NP-hard [20] and was used to design a zero-knowledge authentication scheme [21]. Although NP-hard, the instances of MinRank arising from MQ schemes are often easy, thus providing a powerful tool for finding equivalent keys in canonical form.…”
Section: Introductionmentioning
confidence: 99%
“…Goldwasser and Kalai [7] showed the possibility that the signature depended on (Fiege) FiatShamir can be forged. Courtois has introduced in [8] a new Zero-knowledge proof which is depended on the NP-complete problem that is named MinRank. Wolf has presented in [9] the zero knowledge protocols which are used to fix authentication problems.…”
Section: Introductionmentioning
confidence: 99%