Linear recurring sequences for the UOV key generation

17Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.

Abstract

Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in the post-quantum world. Due to its high efficiency and modest computational requirements, multivariate cryptography seems especially appropriate for signature schemes on low cost devices. However, multivariate schemes are not much used yet, mainly because of the large size of their public keys. In [PB10] Petzoldt et al. presented an idea how to create a multivariate signature scheme with a partially cyclic public key based on the UOV scheme of Kipnis and Patarin [KP99]. In this paper we use their idea to create a multivariate signature scheme whose public key is mainly given by a linear recurring sequence (LRS). By doing so, we are able to reduce the size of the public key by up to 86 %. Moreover, we get a public key with good statistical properties. © 2011 International Association for Cryptologic Research.

References Powered by Scopus

Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer

5532Citations
N/AReaders
Get full text

The Magma algebra system I: The user language

4940Citations
N/AReaders
Get full text

Signal design for good correlation: For wireless communication, cryptography, and radar

997Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A survey of public-key cryptographic primitives in wireless sensor networks

103Citations
N/AReaders
Get full text

Post-quantum cryptography: State of the art

46Citations
N/AReaders
Get full text

Small public keys and fast verification for multivariate quadratic public key systems

23Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Petzoldt, A., Bulygin, S., & Buchmann, J. (2011). Linear recurring sequences for the UOV key generation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6571 LNCS, pp. 335–350). https://doi.org/10.1007/978-3-642-19379-8_21

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 20

77%

Professor / Associate Prof. 2

8%

Lecturer / Post doc 2

8%

Researcher 2

8%

Readers' Discipline

Tooltip

Computer Science 20

80%

Physics and Astronomy 2

8%

Engineering 2

8%

Design 1

4%

Save time finding and organizing research with Mendeley

Sign up for free