2017
DOI: 10.1007/978-3-319-59879-6_12
|View full text |Cite
|
Sign up to set email alerts
|

HMFEv - An Efficient Multivariate Signature Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…Then, similar to the multi-HFE, the number N cannot be large since the complexity of solving it is exponential for N . In [5] (see Table 1), Petzeldt et al selected the parameters of HM-FEv with N = 2, 3 as a signature scheme secure and efficient enough for practical use.…”
Section: Hmfevmentioning
confidence: 99%
See 2 more Smart Citations
“…Then, similar to the multi-HFE, the number N cannot be large since the complexity of solving it is exponential for N . In [5] (see Table 1), Petzeldt et al selected the parameters of HM-FEv with N = 2, 3 as a signature scheme secure and efficient enough for practical use.…”
Section: Hmfevmentioning
confidence: 99%
“…Since the condition that the rank of A is at most R is equivalent that the determinants of arbitrary (R + 1) × (R + 1)minor matrices in A are zero, the min-rank attack requires to solve a system of polynomial equations of degree (at most) N + v + 1 and of m variables. Based on the result in [3], the authors in [5] claimed that the complexity of the min-rank attack is O m+N +v+1 N +v+1 w where 2 ≤ w < 3 is an exponent of the Gaussian elimination. This means that, if one takes v sufficiently large, HMFEv is secure enough against the min-rank attack.…”
Section: Min-rank Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Still, no such attacks are reported in literature. One could say that the idea of decomposing a system to make it easier to solve is not very promising because in big-field schemes such as Gui [24] and medium-field schemes such as HMFEv [23] the systems are decomposed with the objective of making them harder to solve for an attacker.…”
Section: Security Analysis Of the New Schemementioning
confidence: 99%
“…This approach is regarded as one candidate for post-quantum cryptography, in particular as a signature scheme [CJL + 16]. We refer the reader to the thesis of Wolf [Wol05] for an overview, and the recent article [PCDY17] and references therein for recent advances in this area. IQF1S and related problems play an important role in such schemes.…”
Section: Introductionmentioning
confidence: 99%