The Legendre pseudorandom function as a multivariate quadratic cryptosystem: security and applications
نویسندگان
چکیده
Abstract Sequences of consecutive Legendre and Jacobi symbols as pseudorandom bit generators were proposed for cryptographic use in 1988. Major interest has been shown towards functions (PRF) recently, based on the power residue symbols, due to their efficiency multi-party setting. The security these PRFs is not known be reducible standard assumptions. In this work, we show that key-recovery attacks against PRF are equivalent solving a specific family multivariate quadratic (MQ) equation system over finite prime field. This new perspective sheds some light complexity PRF. We conduct algebraic cryptanalysis resulting MQ instance. currently techniques fall short sparse systems. Furthermore, build novel applications PRF, e.g., verifiable random function (verifiable) oblivious (programmable) PRFs.
منابع مشابه
Improved security analysis for OMAC as a pseudorandom function
This paper shows that the advantage of any q-query adversary (which makes at most q queries) for distinguishing OMAC from a uniform random function is roughlyLq/2. HereL is the number of blocks of the longest query and n is the output size of the uniform random function. The so far best bound is roughly σ/2 = O(Lq/2) and hence our new bound is an improved bound. Our improved security analysis a...
متن کاملApplications of Multivariate Quadratic Public Key Systems
In this article, we investigate the class of multivariate quadratic (MQ) public key systems. These systems are becoming a serious alternative to RSA or ECC based systems. After introducing the main ideas and sketching some relevant systems, we deal with the advantages and disadvantages of these kinds of schemes. Based on our observations, we determine application domains in which MQ-schemes hav...
متن کاملA Threshold Pseudorandom Function Construction and Its Applications
We give the first construction of a practical threshold pseudorandom function. The protocol for evaluating the function is efficient enough that it can be used to replace random oracles in some protocols relying on such oracles. In particular, we show how to transform the efficient cryptographically secure Byzantine agreement protocol by Cachin, Kursawe and Shoup for the random oracle model int...
متن کاملOn the Weil Sum Evaluation of Central Polynomial in Multivariate Quadratic Cryptosystem
Abstract. A parity checking-styled Weil sum algorithm is presented for a general class of the univariate polynomials which fully characterize a system of n polynomials in n variables over F2. The previously known proof methods of explicit Weil sum evaluation of Dembowski-Ostrom polynomials are extended to general case. The algorithm computes the absolute values of the Weil sums of the generic c...
متن کاملCryptanalysis of a quadratic knapsack cryptosystem
Wang and Hu [B. Wang and Y. Hu, Quadratic compact knapsack public-key cryptosystem, Comput. Math. Appl. 59 (1) (2010) 194–206] proposed a knapsack-type public-key cryptosystem by introducing an easy quadratic compact knapsack problem and then using the Chinese remainder theorem to disguise the easy knapsack instant. In this paper, we present a heuristic stereotyped message attack that allows th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applicable Algebra in Engineering, Communication and Computing
سال: 2023
ISSN: ['1432-0622', '0938-1279']
DOI: https://doi.org/10.1007/s00200-023-00599-2