搜索结果: 1-8 共查到“密码学 UOV”相关记录8条 . 查询时间(0.046 秒)
A Method to Reduce the Key Size of UOV Signature Scheme
digital signatures public-key cryptography
2019/5/13
Multivariate public key signature scheme has a good performance on speed and signature size. But most of them have a huge public key size. In this paper, we propose a new method to reduce the public k...
Circulant UOV and Circulant Rainbow are new variants of UOV (unbalanced oil and vinegar signature scheme) and Rainbow respectively. In this short report, we study the security of these new variants Ci...
Field lifting for smaller UOV public keys
Post-Quantum Cryptography Multivariate Cryptography Signature Schemes
2017/8/17
Most Multivariate Quadratic (MQ) signature schemes have a very large public key, which makes them unsuitable for many applications, despite attractive features such as speed and small signature sizes....
The unbalanced oil and vinegar signature scheme (UOV) is one of signature schemes
whose public key is a set of multivariate quadratic forms. Recently, a new variant of
UOV called Cubic UOV was propo...
Revisiting the Cubic UOV Signature Scheme
Post-Quantum Cryptography Multivariate Cryptography Signature Schemes
2016/12/7
As recently been emphasized by NSA and NIST, there is an increasing need for cryptographic schemes being secure against quantum computer attacks. Especially in the area of digital signature schemes, m...
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature
Multivariate Quadratic Problem Multivariate Public Key Cryptography
2014/3/5
Multivariate public key cryptography which relies on MQ (Multivariate Quadratic) problems is one of the main approaches to guarantee the security of communication in the post-quantum world. In this pa...
Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes
Multivariate Cryptography UOV Signature Scheme
2014/3/12
Multivariate cryptography is one of the main candidates to guarantee the security of communication in the post-quantum era. Especially in the area of digital signatures, multivariate cryptography offe...
In this short note, we investigate the security of the Unbalanced Oil
and Vinegar Scheme [15]. To do so, we use a hybrid approach for solving the
algebraic systems naturally arising when mounting a ...