The Legendre pseudorandom function as a multivariate quadratic cryptosystem: security and applications

نویسندگان

چکیده

Abstract Sequences of consecutive Legendre and Jacobi symbols as pseudorandom bit generators were proposed for cryptographic use in 1988. Major interest has been shown towards functions (PRF) recently, based on the power residue symbols, due to their efficiency multi-party setting. The security these PRFs is not known be reducible standard assumptions. In this work, we show that key-recovery attacks against PRF are equivalent solving a specific family multivariate quadratic (MQ) equation system over finite prime field. This new perspective sheds some light complexity PRF. We conduct algebraic cryptanalysis resulting MQ instance. currently techniques fall short sparse systems. Furthermore, build novel applications PRF, e.g., verifiable random function (verifiable) oblivious (programmable) PRFs.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved security analysis for OMAC as a pseudorandom function

This paper shows that the advantage of any q-query adversary (which makes at most q queries) for distinguishing OMAC from a uniform random function is roughlyLq/2. HereL is the number of blocks of the longest query and n is the output size of the uniform random function. The so far best bound is roughly σ/2 = O(Lq/2) and hence our new bound is an improved bound. Our improved security analysis a...

متن کامل

Applications of Multivariate Quadratic Public Key Systems

In this article, we investigate the class of multivariate quadratic (MQ) public key systems. These systems are becoming a serious alternative to RSA or ECC based systems. After introducing the main ideas and sketching some relevant systems, we deal with the advantages and disadvantages of these kinds of schemes. Based on our observations, we determine application domains in which MQ-schemes hav...

متن کامل

A Threshold Pseudorandom Function Construction and Its Applications

We give the first construction of a practical threshold pseudorandom function. The protocol for evaluating the function is efficient enough that it can be used to replace random oracles in some protocols relying on such oracles. In particular, we show how to transform the efficient cryptographically secure Byzantine agreement protocol by Cachin, Kursawe and Shoup for the random oracle model int...

متن کامل

On the Weil Sum Evaluation of Central Polynomial in Multivariate Quadratic Cryptosystem

Abstract. A parity checking-styled Weil sum algorithm is presented for a general class of the univariate polynomials which fully characterize a system of n polynomials in n variables over F2. The previously known proof methods of explicit Weil sum evaluation of Dembowski-Ostrom polynomials are extended to general case. The algorithm computes the absolute values of the Weil sums of the generic c...

متن کامل

Cryptanalysis of a quadratic knapsack cryptosystem

Wang and Hu [B. Wang and Y. Hu, Quadratic compact knapsack public-key cryptosystem, Comput. Math. Appl. 59 (1) (2010) 194–206] proposed a knapsack-type public-key cryptosystem by introducing an easy quadratic compact knapsack problem and then using the Chinese remainder theorem to disguise the easy knapsack instant. In this paper, we present a heuristic stereotyped message attack that allows th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applicable Algebra in Engineering, Communication and Computing

سال: 2023

ISSN: ['1432-0622', '0938-1279']

DOI: https://doi.org/10.1007/s00200-023-00599-2