2022 7th International Conference on Computer and Communication Systems (ICCCS) 2022
DOI: 10.1109/icccs55155.2022.9846785
|View full text |Cite
|
Sign up to set email alerts
|

Digital Signature Performance of a New Quantum Safe Multivariate Polynomial Public Key Algorithm

Abstract: This paper presents a comprehensive benchmarking analysis of the Homomorphic Polynomial Public Key (HPPK) Key Encapsulation Mechanism (KEM) and Digital Signature (DS), recently introduced by Kuang et al. Departing from traditional cryptographic approaches, these schemes leverage the security of homomorphic symmetric encryption across two hidden rings without relying on NP-hard problems. HPPK can be considered a specialized variant of Multivariate Public Key Cryptography (MPKC), intricately associated with two … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…To crack MPPK/DS, attackers need to produce a fake signature for a message that can pass verification. This requires universal or selective forgery of signatures, which can be achieved by cracking public keys or signatures to obtain private keys, or by consistently brute-forcing the values A, B, C, D, and E in the verification relationship [55]. MPPK/DS is categorized by 3 main algorithms:…”
Section: Multivariate Polynomial Public Key Digital Signature Schemementioning
confidence: 99%
See 1 more Smart Citation
“…To crack MPPK/DS, attackers need to produce a fake signature for a message that can pass verification. This requires universal or selective forgery of signatures, which can be achieved by cracking public keys or signatures to obtain private keys, or by consistently brute-forcing the values A, B, C, D, and E in the verification relationship [55]. MPPK/DS is categorized by 3 main algorithms:…”
Section: Multivariate Polynomial Public Key Digital Signature Schemementioning
confidence: 99%
“…This technique is comparable to the encryption known-plaintext attack. In the key-only attack, it is assumed that everyone has access to the signer's public key [55]. Utilizing this information, the adversary attempts to replicate the signer's signature and digitally sign messages that the signer does not intend to.…”
Section: Possible Security Attacks On Mppk/dsmentioning
confidence: 99%