Font Size: a A A

Extended Scheme Design And Security Analysis Of Multivariate Public Key Signature Scheme

Posted on:2017-06-06Degree:DoctorType:Dissertation
Country:ChinaCandidate:J H ChenFull Text:PDF
GTID:1318330536952908Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Cryptographic techniques are essential for the security of communication in modern society.In the business world,the communication between trading partners needs to remain confidential.But also the private user deals with cryptography nearly every day.Examples for this are online shopping and software downloads.Public Key Cryptography can also be called as Asymmetric Cryptography.A public key cryptography algorithm is usually based on a mathematically hard problem.Today,nearly all cryptographic schemes used in practice are based on the two problems of factoring large integers and solving discrete logarithms.The best known examples for such schemes are the RSA cryptosystem and the Digital Signature Algorithm(DSA),El-gamal cryptosystems and the Elliptic-Curve Discrete Logarithm(ECC)cryptosystems.However,according to the Shor's algorithm,with the development of quantum-computer,all these algorithms will become insecure.Therefore,to deal with the threat of quantum-computer,one needs alternatives to those classical public key schemes.And we name the novel cryptography that is resist to quantum-computer attack as post-quantum cryptography.In the postquantum cryptography,there are four main directions:(1)Lattice-based cryptography;(2)Hashbased Cryptography;(3)Code-based Cryptography;(4)Multivariate Public Key Cryptography(MPKC for short).Among them,MPKC is our focus.Usually,an MPKC scheme is highly efficient in computing and have an edge over applications on devices with limit computing capacity.However,there remain a number of problems to be solved:1.Constructing New Invertible Trapdoor of Multivariate Schemes2.Reducing Key Sizes for Multivariate Schemes3.Exploring Security Proof for Multivariate Schemes4.Developing ”Advanced”Multivariate CryptosystemsIn this paper,we are going to propose some schemes of MPKC based on some of the above problems.These schemes are listed as follows:First of all,motivated by the first problem ”Constructing New Invertible Trapdoor of Multivariate Schemes”,we explore a new trapdoor based on hyper sphere which can be efficiently used to construct multivariate public key cryptosystem,and we then use this trapdoor to construct a new UOV-like signature scheme(named HS-Sign)for security and efficiency.Also,analysis and experiments are provided to show the security and efficiencies of HS-Sign..Secondly,motivated by the second and the forth problems,we propose an online/offline signature scheme based on unbalanced Oil and Vinegar signature scheme(UOV)for the wireless sensor network.Our scheme can reduce the cost of hardware running with a traditional signing process and the storage space of the private key in a sensor node.What is more,by combining a recent technique,the total storage requirement in a WSN node reduces by 85.8% in the recommended parameters,which makes us successfully provide an actual implementation result of our scheme on the Micaz platform.Thirdly,to explore security proof for multivariate schemes,we focus in the classical unbalanced oil and vinegar(UOV)signature scheme,and discuss its exact security.Then,we successfully make a tighter security proof in the random oracle model for the UOV scheme by making the UOV trapdoor be full domain hash(FDH).Furthermore,to make additional security proof exploring and develop ”Advanced”scheme,we proposed a sequential aggregated signature and then we make formally security proof under the above security assumption for the proposed scheme.Finally,according to the third combining the forth problems,we proposed an idea of constructing a general MPKC proxy scheme based on a basic MPKC signature scheme.For our general construction,a formal security proof is given,which shows that the construction can reach Existential Unforgeability under an Adaptive Chosen Message Attack with Proxy Key Exposure assuming that the underlying signature is Existential Unforgeability under an Adaptive Chosen Message Attack.We then use our general scheme to construct practical proxy signature schemes for three well-known and promising MPKC signature schemes.Finally,we present analysis and experiments for all of our proposed schemes and the baseline schemes.
Keywords/Search Tags:Multivariate Public Key Cryptography, UOV, Online/Offline Signature, Proxy Signature, Wireless Sensor Network, Rainbow Band Separation Attack
PDF Full Text Request
Related items