{"created":"2022-01-28T07:18:50.363614+00:00","id":2008849,"links":{},"metadata":{"_buckets":{"deposit":"31d764d5-c1e0-4815-825a-9fce9ec5d46d"},"_deposit":{"id":"2008849","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"2008849"},"status":"published"},"_oai":{"id":"oai:u-ryukyu.repo.nii.ac.jp:02008849","sets":["1642838163960:1642838338003","1642838403551:1642838406414"]},"author_link":[],"control_number":"2008849","item_1617186331708":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013","subitem_1551255648112":"en"}]},"item_1617186419668":{"attribute_name":"Creator","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hashimoto, Yasufumi","creatorNameLang":"en"}]}]},"item_1617186476635":{"attribute_name":"Access Rights","attribute_value_mlt":[{"subitem_1522299639480":"open access","subitem_1600958577026":"http://purl.org/coar/access_right/c_abf2"}]},"item_1617186499011":{"attribute_name":"Rights","attribute_value_mlt":[{"subitem_1522650717957":"en","subitem_1522651041219":"IEICE"}]},"item_1617186609386":{"attribute_name":"Subject","attribute_value_mlt":[{"subitem_1522299896455":"en","subitem_1522300014469":"Other","subitem_1523261968819":"multivariate public key cryptosystems"},{"subitem_1522299896455":"en","subitem_1522300014469":"Other","subitem_1523261968819":"signature scheme"},{"subitem_1522299896455":"en","subitem_1522300014469":"Other","subitem_1523261968819":"quadratic forms"},{"subitem_1522299896455":"en","subitem_1522300014469":"Other","subitem_1523261968819":"post-quantum cryptography"}]},"item_1617186626617":{"attribute_name":"Description","attribute_value_mlt":[{"subitem_description":"In PQCrypto 2013, Yasuda, Takagi and Sakurai proposed a new signature scheme as one of multivariate public key cryptosystems (MPKCs). This scheme (called YTS) is based on the fact that there are two isometry classes of non-degenerate quadratic forms on a vector space with a prescribed dimension. The advantage of YTS is its efficiency. In fact, its signature generation is eight or nine times faster than Rainbow of similar size. For the security, it is known that the direct attack, the IP attack and the min-rank attack are applicable on YTS, and the running times are exponential time for the first and the second attacks and subexponential time for the third attack. In the present paper, we give a new attack on YTS using an approach similar to the diagonalization of a matrix. Our attack works in polynomial time and it actually recovers equivalent secret keys of YTS having 140-bits security againt min-rank attack in several minutes.","subitem_description_type":"Other"},{"subitem_description":"論文","subitem_description_type":"Other"}]},"item_1617186643794":{"attribute_name":"Publisher","attribute_value_mlt":[{"subitem_1522300295150":"en","subitem_1522300316516":"The Institute of Electronics, Information and Communication Engineers"},{"subitem_1522300295150":"ja","subitem_1522300316516":"一般社団法人電子情報通信学会"}]},"item_1617186702042":{"attribute_name":"Language","attribute_value_mlt":[{"subitem_1551255818386":"eng"}]},"item_1617186783814":{"attribute_name":"Identifier","attribute_value_mlt":[{"subitem_identifier_type":"HDL","subitem_identifier_uri":"http://hdl.handle.net/20.500.12000/37648"}]},"item_1617186920753":{"attribute_name":"Source Identifier","attribute_value_mlt":[{"subitem_1522646500366":"EISSN","subitem_1522646572813":"0916-8508"},{"subitem_1522646500366":"EISSN","subitem_1522646572813":"1745-1337"},{"subitem_1522646500366":"NCID","subitem_1522646572813":"AA10826239"}]},"item_1617186941041":{"attribute_name":"Source Title","attribute_value_mlt":[{"subitem_1522650068558":"en","subitem_1522650091861":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"}]},"item_1617187056579":{"attribute_name":"Bibliographic Information","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2016-01-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicPageEnd":"65","bibliographicPageStart":"58","bibliographicVolumeNumber":"E99-A"}]},"item_1617258105262":{"attribute_name":"Resource Type","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_1617265215918":{"attribute_name":"Version Type","attribute_value_mlt":[{"subitem_1522305645492":"VoR","subitem_1600292170262":"http://purl.org/coar/version/c_970fb48d4fbd8a85"}]},"item_1617353299429":{"attribute_name":"Relation","attribute_value_mlt":[{"subitem_1522306287251":{"subitem_1522306382014":"URI","subitem_1522306436033":"https://www.ieice.org/jpn/index.html"}},{"subitem_1522306287251":{"subitem_1522306382014":"DOI","subitem_1522306436033":"https://dx.doi.org/10.1587/transfun.E99.A.58"}}]},"item_1617605131499":{"attribute_name":"File","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","filename":"e99-a_1_58.pdf","mimetype":"application/pdf","url":{"objectType":"fulltext","url":"https://u-ryukyu.repo.nii.ac.jp/record/2008849/files/e99-a_1_58.pdf"},"version_id":"05c0ffbe-4061-4b0a-8c55-61678a8bb475"}]},"item_title":"Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013","item_type_id":"15","owner":"1","path":["1642838338003","1642838406414"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2018-02-05"},"publish_date":"2018-02-05","publish_status":"0","recid":"2008849","relation_version_is_last":true,"title":["Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2023-08-03T05:37:52.969079+00:00"}