Total break of the l-IC signature scheme

20Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

Abstract

In this paper, we describe efficient forgery and full-key recovery attacks on the l-IC- signature scheme recently proposed at PKC 2007. This cryptosystem is a multivariate scheme based on a new internal quadratic primitive which avoids some drawbacks of previous multivariate schemes: the scheme is extremely fast since it requires one exponentiation in a finite field of medium size and the public key is shorter than in many multivariate signature schemes. Our attacks rely on the recent cryptanalytic tool developed by Dubois et al. against the SFLASH signature scheme. However, the final stage of the attacks requires the use of Gröbner basis techniques to conclude to actually forge a signature (resp. to recover the secret key). For the forgery attack, this is due to the fact that Patarin's attack is much more difficult to mount against l-IC. The key recovery attack is also very efficient since it is faster to recover equivalent secret keys than to forge. © 2008 Springer-Verlag Berlin Heidelberg.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Fouque, P. A., MacArio-Rat, G., Perret, L., & Stern, J. (2008). Total break of the l-IC signature scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4939 LNCS, pp. 1–17). https://doi.org/10.1007/978-3-540-78440-1_1

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 23

77%

Researcher 3

10%

Professor / Associate Prof. 2

7%

Lecturer / Post doc 2

7%

Readers' Discipline

Tooltip

Computer Science 21

78%

Physics and Astronomy 2

7%

Engineering 2

7%

Mathematics 2

7%

Save time finding and organizing research with Mendeley

Sign up for free