{"created":"2022-01-28T07:18:51.876108+00:00","id":2008850,"links":{},"metadata":{"_buckets":{"deposit":"e5a39a5a-eef1-46d7-9c1c-973ea54dcda7"},"_deposit":{"id":"2008850","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"2008850"},"status":"published"},"_oai":{"id":"oai:u-ryukyu.repo.nii.ac.jp:02008850","sets":["1642838163960:1642838338003","1642838403551:1642838406414"]},"author_link":[],"control_number":"2008850","item_1617186331708":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_title":"Cryptanalysis of the Quaternion Rainbow","subitem_title_language":"en"}]},"item_1617186419668":{"attribute_name":"Creator","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hashimoto, Yasufumi","creatorNameLang":"en"}]}]},"item_1617186476635":{"attribute_name":"Access Rights","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_1617186499011":{"attribute_name":"Rights","attribute_value_mlt":[{"subitem_rights":"IEICE","subitem_rights_language":"en"},{"subitem_rights":"http://www.ieice.org/jpn/","subitem_rights_language":"en","subitem_rights_resource":"http://www.ieice.org/jpn/"}]},"item_1617186609386":{"attribute_name":"Subject","attribute_value_mlt":[{"subitem_subject":"post-quantum cryptography","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"multivariate public-key cryptosystems","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"rainbow","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"quaternion ring","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_1617186626617":{"attribute_name":"Description","attribute_value_mlt":[{"subitem_description":"Rainbow is one of signature schemes based on the problem solving a set of multivariate quadratic equations. While its signature generation and verification are fast and the security is presently sufficient under suitable parameter selections, the key size is relatively large. Recently, Quaternion Rainbow — Rainbow over a quaternion ring — was proposed by Yasuda, Sakurai and Takagi (CT-RSA'12) to reduce the key size of Rainbow without impairing the security. However, a new vulnerability emerges from the structure of quaternion ring; in fact, Thomae (SCN'12) found that Quaternion Rainbow is less secure than the same-size original Rainbow. In the present paper, we further study the structure of Quaternion Rainbow and show that Quaternion Rainbow is one of sparse versions of the Rainbow. Its sparse structure causes a vulnerability of Quaternion Rainbow. Especially, we find that Quaternion Rainbow over even characteristic field, whose security level is estimated as about the original Rainbow of at most 3/4 by Thomae's analysis, is almost as secure as the original Rainbow of at most 1/4-size.","subitem_description_type":"Other"},{"subitem_description":"論文","subitem_description_type":"Other"}]},"item_1617186643794":{"attribute_name":"Publisher","attribute_value_mlt":[{"subitem_publisher":"The Institute of Electronics, Information and Communication Engineers","subitem_publisher_language":"en"},{"subitem_publisher":"一般社団法人電子情報通信学会","subitem_publisher_language":"ja"}]},"item_1617186702042":{"attribute_name":"Language","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_1617186783814":{"attribute_name":"Identifier","attribute_value_mlt":[{"subitem_identifier_type":"HDL","subitem_identifier_uri":"http://hdl.handle.net/20.500.12000/37649"}]},"item_1617186920753":{"attribute_name":"Source Identifier","attribute_value_mlt":[{"subitem_source_identifier":"0916-8508","subitem_source_identifier_type":"EISSN"},{"subitem_source_identifier":"1745-1337","subitem_source_identifier_type":"EISSN"},{"subitem_source_identifier":"AA10826239","subitem_source_identifier_type":"NCID"}]},"item_1617186941041":{"attribute_name":"Source Title","attribute_value_mlt":[{"subitem_source_title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","subitem_source_title_language":"en"}]},"item_1617187056579":{"attribute_name":"Bibliographic Information","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2015-01-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicPageEnd":"152","bibliographicPageStart":"144","bibliographicVolumeNumber":"E98-A"}]},"item_1617258105262":{"attribute_name":"Resource Type","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_1617265215918":{"attribute_name":"Version Type","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_1617353299429":{"attribute_name":"Relation","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://dx.doi.org/10.1587/transfun.E98.A.144","subitem_relation_type_select":"DOI"}},{"subitem_relation_type_id":{"subitem_relation_type_id_text":"info:doi/10.1587/transfun.E98.A.144","subitem_relation_type_select":"DOI"}}]},"item_1617605131499":{"attribute_name":"File","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","filename":"VolE98-Ano1p144.pdf","mimetype":"application/pdf","url":{"objectType":"fulltext","url":"https://u-ryukyu.repo.nii.ac.jp/record/2008850/files/VolE98-Ano1p144.pdf"},"version_id":"8ad6696c-9dc5-43f2-8854-2c42945e82fa"}]},"item_title":"Cryptanalysis of the Quaternion Rainbow","item_type_id":"15","owner":"1","path":["1642838338003","1642838406414"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2018-02-05"},"publish_date":"2018-02-05","publish_status":"0","recid":"2008850","relation_version_is_last":true,"title":["Cryptanalysis of the Quaternion Rainbow"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2023-08-03T05:37:52.760074+00:00"}