WEKO3
アイテム
{"_buckets": {"deposit": "e5a39a5a-eef1-46d7-9c1c-973ea54dcda7"}, "_deposit": {"id": "2008850", "owners": [1], "pid": {"revision_id": 0, "type": "depid", "value": "2008850"}, "status": "published"}, "_oai": {"id": "oai:u-ryukyu.repo.nii.ac.jp:02008850", "sets": ["1642838338003", "1642838406414"]}, "author_link": [], "control_number": "2008850", "item_1617186331708": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Cryptanalysis of the Quaternion Rainbow", "subitem_1551255648112": "en"}]}, "item_1617186419668": {"attribute_name": "Creator", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Hashimoto, Yasufumi", "creatorNameLang": "en"}]}]}, "item_1617186476635": {"attribute_name": "Access Rights", "attribute_value_mlt": [{"subitem_1522299639480": "open access", "subitem_1600958577026": "http://purl.org/coar/access_right/c_abf2"}]}, "item_1617186499011": {"attribute_name": "Rights", "attribute_value_mlt": [{"subitem_1522650717957": "en", "subitem_1522651041219": "IEICE"}, {"subitem_1522650717957": "en", "subitem_1522650727486": "http://www.ieice.org/jpn/", "subitem_1522651041219": "http://www.ieice.org/jpn/"}]}, "item_1617186609386": {"attribute_name": "Subject", "attribute_value_mlt": [{"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "post-quantum cryptography"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "multivariate public-key cryptosystems"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "rainbow"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "quaternion ring"}]}, "item_1617186626617": {"attribute_name": "Description", "attribute_value_mlt": [{"subitem_description": "Rainbow is one of signature schemes based on the problem solving a set of multivariate quadratic equations. While its signature generation and verification are fast and the security is presently sufficient under suitable parameter selections, the key size is relatively large. Recently, Quaternion Rainbow — Rainbow over a quaternion ring — was proposed by Yasuda, Sakurai and Takagi (CT-RSA\u002712) to reduce the key size of Rainbow without impairing the security. However, a new vulnerability emerges from the structure of quaternion ring; in fact, Thomae (SCN\u002712) found that Quaternion Rainbow is less secure than the same-size original Rainbow. In the present paper, we further study the structure of Quaternion Rainbow and show that Quaternion Rainbow is one of sparse versions of the Rainbow. Its sparse structure causes a vulnerability of Quaternion Rainbow. Especially, we find that Quaternion Rainbow over even characteristic field, whose security level is estimated as about the original Rainbow of at most 3/4 by Thomae\u0027s analysis, is almost as secure as the original Rainbow of at most 1/4-size.", "subitem_description_type": "Other"}, {"subitem_description": "論文", "subitem_description_type": "Other"}]}, "item_1617186643794": {"attribute_name": "Publisher", "attribute_value_mlt": [{"subitem_1522300295150": "en", "subitem_1522300316516": "The Institute of Electronics, Information and Communication Engineers"}, {"subitem_1522300295150": "ja", "subitem_1522300316516": "一般社団法人電子情報通信学会"}]}, "item_1617186702042": {"attribute_name": "Language", "attribute_value_mlt": [{"subitem_1551255818386": "eng"}]}, "item_1617186783814": {"attribute_name": "Identifier", "attribute_value_mlt": [{"subitem_identifier_type": "HDL", "subitem_identifier_uri": "http://hdl.handle.net/20.500.12000/37649"}]}, "item_1617186920753": {"attribute_name": "Source Identifier", "attribute_value_mlt": [{"subitem_1522646500366": "EISSN", "subitem_1522646572813": "0916-8508"}, {"subitem_1522646500366": "EISSN", "subitem_1522646572813": "1745-1337"}, {"subitem_1522646500366": "NCID", "subitem_1522646572813": "AA10826239"}]}, "item_1617186941041": {"attribute_name": "Source Title", "attribute_value_mlt": [{"subitem_1522650068558": "en", "subitem_1522650091861": "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"}]}, "item_1617187056579": {"attribute_name": "Bibliographic Information", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2015-01-01", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "1", "bibliographicPageEnd": "152", "bibliographicPageStart": "144", "bibliographicVolumeNumber": "E98-A"}]}, "item_1617258105262": {"attribute_name": "Resource Type", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_1617265215918": {"attribute_name": "Version Type", "attribute_value_mlt": [{"subitem_1522305645492": "VoR", "subitem_1600292170262": "http://purl.org/coar/version/c_970fb48d4fbd8a85"}]}, "item_1617353299429": {"attribute_name": "Relation", "attribute_value_mlt": [{"subitem_1522306287251": {"subitem_1522306382014": "DOI", "subitem_1522306436033": "https://dx.doi.org/10.1587/transfun.E98.A.144"}}, {"subitem_1522306287251": {"subitem_1522306382014": "DOI", "subitem_1522306436033": "info:doi/10.1587/transfun.E98.A.144"}}]}, "item_1617605131499": {"attribute_name": "File", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "download_preview_message": "", "file_order": 0, "filename": "VolE98-Ano1p144.pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "", "size": 0, "url": {"objectType": "fulltext", "url": "https://u-ryukyu.repo.nii.ac.jp/record/2008850/files/VolE98-Ano1p144.pdf"}, "version_id": "8ad6696c-9dc5-43f2-8854-2c42945e82fa"}]}, "item_title": "Cryptanalysis of the Quaternion Rainbow", "item_type_id": "15", "owner": "1", "path": ["1642838338003", "1642838406414"], "permalink_uri": "http://hdl.handle.net/20.500.12000/37649", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2018-02-05"}, "publish_date": "2018-02-05", "publish_status": "0", "recid": "2008850", "relation": {}, "relation_version_is_last": true, "title": ["Cryptanalysis of the Quaternion Rainbow"], "weko_shared_id": -1}
Cryptanalysis of the Quaternion Rainbow
http://hdl.handle.net/20.500.12000/37649
http://hdl.handle.net/20.500.12000/3764913dd2e0a-eb7c-492a-9175-8850a7800fa4
名前 / ファイル | ライセンス | アクション |
---|---|---|
VolE98-Ano1p144.pdf
|
|
Item type | デフォルトアイテムタイプ(フル)(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2018-02-05 | |||||||
タイトル | ||||||||
タイトル | Cryptanalysis of the Quaternion Rainbow | |||||||
言語 | en | |||||||
作成者 |
Hashimoto, Yasufumi
× Hashimoto, Yasufumi
|
|||||||
アクセス権 | ||||||||
アクセス権 | open access | |||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||
権利情報 | ||||||||
言語 | en | |||||||
権利情報 | IEICE | |||||||
権利情報 | ||||||||
言語 | en | |||||||
権利情報Resource | http://www.ieice.org/jpn/ | |||||||
権利情報 | http://www.ieice.org/jpn/ | |||||||
主題 | ||||||||
言語 | en | |||||||
主題Scheme | Other | |||||||
主題 | post-quantum cryptography | |||||||
主題 | ||||||||
言語 | en | |||||||
主題Scheme | Other | |||||||
主題 | multivariate public-key cryptosystems | |||||||
主題 | ||||||||
言語 | en | |||||||
主題Scheme | Other | |||||||
主題 | rainbow | |||||||
主題 | ||||||||
言語 | en | |||||||
主題Scheme | Other | |||||||
主題 | quaternion ring | |||||||
内容記述 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Rainbow is one of signature schemes based on the problem solving a set of multivariate quadratic equations. While its signature generation and verification are fast and the security is presently sufficient under suitable parameter selections, the key size is relatively large. Recently, Quaternion Rainbow — Rainbow over a quaternion ring — was proposed by Yasuda, Sakurai and Takagi (CT-RSA'12) to reduce the key size of Rainbow without impairing the security. However, a new vulnerability emerges from the structure of quaternion ring; in fact, Thomae (SCN'12) found that Quaternion Rainbow is less secure than the same-size original Rainbow. In the present paper, we further study the structure of Quaternion Rainbow and show that Quaternion Rainbow is one of sparse versions of the Rainbow. Its sparse structure causes a vulnerability of Quaternion Rainbow. Especially, we find that Quaternion Rainbow over even characteristic field, whose security level is estimated as about the original Rainbow of at most 3/4 by Thomae's analysis, is almost as secure as the original Rainbow of at most 1/4-size. | |||||||
内容記述 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | 論文 | |||||||
出版者 | ||||||||
言語 | en | |||||||
出版者 | The Institute of Electronics, Information and Communication Engineers | |||||||
出版者 | ||||||||
言語 | ja | |||||||
出版者 | 一般社団法人電子情報通信学会 | |||||||
言語 | ||||||||
言語 | eng | |||||||
資源タイプ | ||||||||
資源タイプ | journal article | |||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||
出版タイプ | ||||||||
出版タイプ | VoR | |||||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |||||||
識別子 | ||||||||
識別子 | http://hdl.handle.net/20.500.12000/37649 | |||||||
識別子タイプ | HDL | |||||||
関連情報 | ||||||||
識別子タイプ | DOI | |||||||
関連識別子 | https://dx.doi.org/10.1587/transfun.E98.A.144 | |||||||
関連情報 | ||||||||
識別子タイプ | DOI | |||||||
関連識別子 | info:doi/10.1587/transfun.E98.A.144 | |||||||
収録物識別子 | ||||||||
収録物識別子タイプ | EISSN | |||||||
収録物識別子 | 0916-8508 | |||||||
収録物識別子 | ||||||||
収録物識別子タイプ | EISSN | |||||||
収録物識別子 | 1745-1337 | |||||||
収録物識別子 | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AA10826239 | |||||||
収録物名 | ||||||||
言語 | en | |||||||
収録物名 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | |||||||
書誌情報 |
巻 E98-A, 号 1, p. 144-152, 発行日 2015-01-01 |