DOI: 10.1007/978-3-540-85053-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Time-Area Optimized Public-Key Engines: $\mathcal{MQ}$ -Cryptosystems as Replacement for Elliptic Curves?

Abstract: In this paper ways to efficiently implement public-key schemes based on Multivariate Quadratic polynomials (MQ-schemes for short) are investigated. In particular, they are claimed to resist quantum computer attacks. It is shown that such schemes can have a much better time-area product than elliptic curve cryptosystems. For instance, an optimised FPGA implementation of amended TTS is estimated to be over 50 times more efficient with respect to this parameter. Moreover, a general framework for implementing smal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
38
0

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 70 publications
(39 citation statements)
references
References 11 publications
1
38
0
Order By: Relevance
“…Note that ECDSA is the most efficient of the three. However, even when comparing to signature generation in MQ and ECC, the former are a factor of 2 -50 faster on FPGA than the latter [3]. Similar results have been demonstrated for comparison with RSA and ECC in software [21], [4], [5].…”
Section: Introductionsupporting
confidence: 69%
“…Note that ECDSA is the most efficient of the three. However, even when comparing to signature generation in MQ and ECC, the former are a factor of 2 -50 faster on FPGA than the latter [3]. Similar results have been demonstrated for comparison with RSA and ECC in software [21], [4], [5].…”
Section: Introductionsupporting
confidence: 69%
“…Implementations of several post-quantum multivariate quadratic (MQ) signature schemes like Unbalanced Oil and Vinegar (UOV), Rainbow, and TTS were given in [BERW08]. These schemes are usually faster (factor 2-50) than ECC but also suffer from large key sizes for the private and public key (e.g., 80 Kb for UOV) [PTBW11].…”
Section: Comparison Of Our Implementations With Related Workmentioning
confidence: 99%
“…If parameters are selected as (n, q, θ, r, a) = (84, 2,4,6,14), the length of the plaintext block is 84 bits and the length of the ciphertext block is 98 bits, it needs to add 14 external perturbations, the public key is 358,190 (3,655*98) bits, i.e. 44,774 bytes.…”
Section: Security and Parameter Selection Of Pmi+mentioning
confidence: 99%