ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "152aec8f-c6c1-462f-9604-bf13e59168ac"}, "_deposit": {"id": "2008850", "owners": [1], "pid": {"revision_id": 0, "type": "depid", "value": "2008850"}, "status": "published"}, "_oai": {"id": "oai:u-ryukyu.repo.nii.ac.jp:02008850", "sets": ["1642838338003", "1642838406414"]}, "author_link": [], "item_1617186331708": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Cryptanalysis of the Quaternion Rainbow", "subitem_1551255648112": "en"}]}, "item_1617186419668": {"attribute_name": "Creator", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Hashimoto, Yasufumi", "creatorNameLang": "en"}]}]}, "item_1617186476635": {"attribute_name": "Access Rights", "attribute_value_mlt": [{"subitem_1522299639480": "open access", "subitem_1600958577026": "http://purl.org/coar/access_right/c_abf2"}]}, "item_1617186499011": {"attribute_name": "Rights", "attribute_value_mlt": [{"subitem_1522650717957": "en", "subitem_1522651041219": "IEICE"}, {"subitem_1522650717957": "en", "subitem_1522650727486": "http://www.ieice.org/jpn/", "subitem_1522651041219": "http://www.ieice.org/jpn/"}]}, "item_1617186609386": {"attribute_name": "Subject", "attribute_value_mlt": [{"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "post-quantum cryptography"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "multivariate public-key cryptosystems"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "rainbow"}, {"subitem_1522299896455": "en", "subitem_1522300014469": "Other", "subitem_1523261968819": "quaternion ring"}]}, "item_1617186626617": {"attribute_name": "Description", "attribute_value_mlt": [{"subitem_description": "Rainbow is one of signature schemes based on the problem solving a set of multivariate quadratic equations. While its signature generation and verification are fast and the security is presently sufficient under suitable parameter selections, the key size is relatively large. Recently, Quaternion Rainbow \u2014 Rainbow over a quaternion ring \u2014 was proposed by Yasuda, Sakurai and Takagi (CT-RSA\u002712) to reduce the key size of Rainbow without impairing the security. However, a new vulnerability emerges from the structure of quaternion ring; in fact, Thomae (SCN\u002712) found that Quaternion Rainbow is less secure than the same-size original Rainbow. In the present paper, we further study the structure of Quaternion Rainbow and show that Quaternion Rainbow is one of sparse versions of the Rainbow. Its sparse structure causes a vulnerability of Quaternion Rainbow. Especially, we find that Quaternion Rainbow over even characteristic field, whose security level is estimated as about the original Rainbow of at most 3/4 by Thomae\u0027s analysis, is almost as secure as the original Rainbow of at most 1/4-size.", "subitem_description_type": "Other"}, {"subitem_description": "\u8ad6\u6587", "subitem_description_type": "Other"}]}, "item_1617186643794": {"attribute_name": "Publisher", "attribute_value_mlt": [{"subitem_1522300295150": "en", "subitem_1522300316516": "The Institute of Electronics, Information and Communication Engineers"}, {"subitem_1522300295150": "ja", "subitem_1522300316516": "\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a"}]}, "item_1617186702042": {"attribute_name": "Language", "attribute_value_mlt": [{"subitem_1551255818386": "eng"}]}, "item_1617186783814": {"attribute_name": "Identifier", "attribute_value_mlt": [{"subitem_identifier_type": "HDL", "subitem_identifier_uri": "http://hdl.handle.net/20.500.12000/37649"}]}, "item_1617186920753": {"attribute_name": "Source Identifier", "attribute_value_mlt": [{"subitem_1522646500366": "ISSN", "subitem_1522646572813": "0916-8508"}, {"subitem_1522646500366": "ISSN", "subitem_1522646572813": "1745-1337"}, {"subitem_1522646500366": "NCID", "subitem_1522646572813": "AA10826239"}]}, "item_1617186941041": {"attribute_name": "Source Title", "attribute_value_mlt": [{"subitem_1522650068558": "en", "subitem_1522650091861": "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"}]}, "item_1617187056579": {"attribute_name": "Bibliographic Information", "attribute_value_mlt": [{"bibliographicIssueNumber": "1", "bibliographicPageEnd": "152", "bibliographicPageStart": "144", "bibliographicVolumeNumber": "E98-A"}]}, "item_1617258105262": {"attribute_name": "Resource Type", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_1617265215918": {"attribute_name": "Version Type", "attribute_value_mlt": [{"subitem_1522305645492": "VoR", "subitem_1600292170262": "http://purl.org/coar/version/c_970fb48d4fbd8a85"}]}, "item_1617353299429": {"attribute_name": "Relation", "attribute_value_mlt": [{"subitem_1522306287251": {"subitem_1522306382014": "DOI", "subitem_1522306436033": "http://dx.doi.org/10.1587/transfun.E98.A.144"}}, {"subitem_1522306287251": {"subitem_1522306382014": "DOI", "subitem_1522306436033": "info:doi/10.1587/transfun.E98.A.144"}}]}, "item_1617605131499": {"attribute_name": "File", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "download_preview_message": "", "file_order": 0, "filename": "VolE98-Ano1p144.pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "", "size": 0, "url": {"objectType": "fulltext", "url": "https://u-ryukyu.repo.nii.ac.jp/record/2008850/files/VolE98-Ano1p144.pdf"}, "version_id": "6f7fe94b-0575-423b-b79b-fdc93a86712d"}]}, "item_title": "Cryptanalysis of the Quaternion Rainbow", "item_type_id": "15", "owner": "1", "path": ["1642838338003", "1642838406414"], "permalink_uri": "http://hdl.handle.net/20.500.12000/37649", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2018-02-05"}, "publish_date": "2018-02-05", "publish_status": "0", "recid": "2008850", "relation": {}, "relation_version_is_last": true, "title": ["Cryptanalysis of the Quaternion Rainbow"], "weko_shared_id": -1}
  1. 学術雑誌論文
  2. その他
  1. 部局別インデックス
  2. 理学部

Cryptanalysis of the Quaternion Rainbow

http://hdl.handle.net/20.500.12000/37649
http://hdl.handle.net/20.500.12000/37649
13dd2e0a-eb7c-492a-9175-8850a7800fa4
名前 / ファイル ライセンス アクション
VolE98-Ano1p144.pdf VolE98-Ano1p144.pdf
Item type デフォルトアイテムタイプ(フル)(1)
公開日 2018-02-05
タイトル
タイトル Cryptanalysis of the Quaternion Rainbow
言語 en
作成者 Hashimoto, Yasufumi

× Hashimoto, Yasufumi

en Hashimoto, Yasufumi

アクセス権
アクセス権 open access
アクセス権URI http://purl.org/coar/access_right/c_abf2
権利情報
言語 en
権利情報 IEICE
言語 en
権利情報Resource http://www.ieice.org/jpn/
権利情報 http://www.ieice.org/jpn/
主題
言語 en
主題Scheme Other
主題 post-quantum cryptography
言語 en
主題Scheme Other
主題 multivariate public-key cryptosystems
言語 en
主題Scheme Other
主題 rainbow
言語 en
主題Scheme Other
主題 quaternion ring
内容記述
内容記述タイプ Other
内容記述 Rainbow is one of signature schemes based on the problem solving a set of multivariate quadratic equations. While its signature generation and verification are fast and the security is presently sufficient under suitable parameter selections, the key size is relatively large. Recently, Quaternion Rainbow — Rainbow over a quaternion ring — was proposed by Yasuda, Sakurai and Takagi (CT-RSA'12) to reduce the key size of Rainbow without impairing the security. However, a new vulnerability emerges from the structure of quaternion ring; in fact, Thomae (SCN'12) found that Quaternion Rainbow is less secure than the same-size original Rainbow. In the present paper, we further study the structure of Quaternion Rainbow and show that Quaternion Rainbow is one of sparse versions of the Rainbow. Its sparse structure causes a vulnerability of Quaternion Rainbow. Especially, we find that Quaternion Rainbow over even characteristic field, whose security level is estimated as about the original Rainbow of at most 3/4 by Thomae's analysis, is almost as secure as the original Rainbow of at most 1/4-size.
内容記述タイプ Other
内容記述 論文
出版者
言語 ja
出版者 一般社団法人電子情報通信学会
言語
言語 eng
資源タイプ
資源タイプ journal article
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
識別子
識別子 http://hdl.handle.net/20.500.12000/37649
識別子タイプ HDL
関連情報
関連識別子
識別子タイプ DOI
関連識別子 http://dx.doi.org/10.1587/transfun.E98.A.144
関連識別子
識別子タイプ DOI
関連識別子 info:doi/10.1587/transfun.E98.A.144
収録物識別子
収録物識別子タイプ ISSN
収録物識別子 0916-8508
収録物識別子タイプ ISSN
収録物識別子 1745-1337
収録物識別子タイプ NCID
収録物識別子 AA10826239
収録物名
言語 en
収録物名 IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
書誌情報
巻 E98-A, 号 1, p. 144-152
戻る
0
views
See details
Views

Versions

Ver.1 2022-01-28 07:18:55.628643
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON

確認


Powered by WEKO3


Powered by WEKO3