• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Security analysis on post-quantum cryptography based on multivariate quadratic polynomial problem

Research Project

Project/Area Number 19K20266
Research Category

Grant-in-Aid for Early-Career Scientists

Allocation TypeMulti-year Fund
Review Section Basic Section 60070:Information security-related
Research InstitutionKyushu University

Principal Investigator

Ikematsu Yasuhiko  九州大学, マス・フォア・インダストリ研究所, 助教 (40833570)

Project Period (FY) 2019-04-01 – 2024-03-31
Project Status Completed (Fiscal Year 2023)
Budget Amount *help
¥3,640,000 (Direct Cost: ¥2,800,000、Indirect Cost: ¥840,000)
Fiscal Year 2021: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2020: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2019: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Keywords耐量子計算機暗号 / 多変数多項式暗号 / MinRank問題 / グレブナー基底 / 暗号理論 / 多変数多項式公開鍵暗号 / 応用数学
Outline of Research at the Start

量子コンピュータに耐性のある暗号(耐量子暗号)の研究を行う。耐量子暗号の候補として格子暗号・符号暗号などがあるが、その中、多変数多項式公開鍵暗号(MPKC)は、高速な処理性能を有し、署名長が短いという優れた利点を持つ。それだけでなく、いくつかの暗号プロトコル(UOV, HFEv-)は20年間も破られておらず、耐量子暗号の実用化・標準化の有力な候補となっている。しかし、安全性パラメータの設定に必要である詳細かつ正確な安全性解析は十分であるとは言い難い。そこで本研究では、MPKCの安全性を測るグレブナー基底攻撃・ランク攻撃の精密な解析を行う。

Outline of Final Research Achievements

We studied the security analysis on multivariate public key cryptography (MPKC) based on the hardness of solving multivariate quadratic equations over finite fields. In particular, we analysed various multivariate cryptosystems, including schemes submitted to the NIST PQC standardization project, aiming at a precise estimation of the Groebner basis attacks and rank attacks. As a result, we found vulnerabilities in some schemes and proposed security estimations based on new attack methods. Moreover, using the results obtained in this study, we proposed a signature scheme and ID scheme.

Academic Significance and Societal Importance of the Research Achievements

多変数多項式暗号は連立二次方程式の求解困難性を利用した耐量子計算機暗号の一つであり、量子コンピュータ時代における次世代暗号として必要不可欠な技術となっている。本研究課題で提案した方式や安全性解析手法により、安心・安全な耐量子計算機暗号の実用化に貢献できれば、量子コンピュータ時代の暗号基盤を支える重要な要素となり、社会に与えるインパクトは大きい。

Report

(6 results)
  • 2023 Annual Research Report   Final Research Report ( PDF )
  • 2022 Research-status Report
  • 2021 Research-status Report
  • 2020 Research-status Report
  • 2019 Research-status Report
  • Research Products

    (36 results)

All 2024 2023 2022 2021 2020 2019

All Journal Article (18 results) (of which Peer Reviewed: 14 results) Presentation (18 results) (of which Int'l Joint Research: 3 results,  Invited: 1 results)

  • [Journal Article] Revisiting the security analysis of SNOVA2024

    • Author(s)
      Yasuhiko Ikematsu, Rika Akiyama
    • Journal Title

      APKC2024

      Volume: -

    • Related Report
      2023 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A survey on small public key signature schemes derived from UOV signature scheme2024

    • Author(s)
      Yasuhiko Ikematsu
    • Journal Title

      Mathematical Foundations for Post-Quantum Cryptography, Mathematics for Industry, Springer

      Volume: -

    • Related Report
      2023 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Revisiting the security analysis of SNOVA2024

    • Author(s)
      Yasuhiko Ikematsu, Rika Akiyama
    • Journal Title

      2024 Symposium on Cryptography and Information Security

      Volume: -

    • Related Report
      2023 Annual Research Report
  • [Journal Article] A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack2023

    • Author(s)
      Hiroki Furue, Yasuhiko Ikematsu
    • Journal Title

      Proceedings of IWSEC 2023

      Volume: LNCS 14128 Pages: 101-116

    • Related Report
      2023 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 韓国PQC標準化計画(KpqC)で提案されたMQ-Signの安全性解析2023

    • Author(s)
      池松 泰彦, Hyungrok Jo, 安田 貴徳
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: Vol.123, No.129, ISEC2023-31 Pages: 113-118

    • Related Report
      2023 Annual Research Report
  • [Journal Article] A security analysis on MQ-Sign2023

    • Author(s)
      Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda
    • Journal Title

      Proceedings of the 24th World Conference on Information Security Applications

      Volume: LNCS 14402 Pages: 40-51

    • Related Report
      2023 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A New Analysis of the Kipnis-Shamir Method Solving the MinRank Problem2023

    • Author(s)
      Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang
    • Journal Title

      IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Cryptography and Information Security)

      Volume: E106-A No.3

    • Related Report
      2022 Research-status Report
    • Peer Reviewed
  • [Journal Article] Recent progress in the security evaluation of multivariate public-key cryptography2023

    • Author(s)
      Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi
    • Journal Title

      IET Information Security

      Volume: Vol.17, Issue 2 Pages: 210-226

    • Related Report
      2022 Research-status Report
    • Peer Reviewed
  • [Journal Article] Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask2022

    • Author(s)
      Yuntao Wang, Yasuhiko Ikematsu, Takanori Yasuda
    • Journal Title

      Proceedings of ProvSec 2022

      Volume: LNCS13600 Pages: 88-104

    • Related Report
      2022 Research-status Report
    • Peer Reviewed
  • [Journal Article] Security Analysis on an ElGamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials2021

    • Author(s)
      Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 13007 Pages: 235-250

    • Related Report
      2021 Research-status Report
    • Peer Reviewed
  • [Journal Article] New complexity estimation on the Rainbow-Band-Separation attack2021

    • Author(s)
      Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi
    • Journal Title

      Theoretical Computer Science

      Volume: 896 Pages: 1-18

    • Related Report
      2021 Research-status Report
    • Peer Reviewed
  • [Journal Article] A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV2021

    • Author(s)
      Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 13093 Pages: 187-217

    • Related Report
      2021 Research-status Report
    • Peer Reviewed
  • [Journal Article] Security analysis on an El-Gamal-like multivariate encryption scheme based on a generalization of IP2S problem2021

    • Author(s)
      Yasuhiko Ikematsu,Shuhei Nakamura, Bagus Santoso, Takanori Yasuda
    • Journal Title

      Symposium on Cryptography and Information Security (SCIS2021)

      Volume: -

    • Related Report
      2020 Research-status Report
  • [Journal Article] Public Key Cryptosystems Combining Lattice and Multivariate Polynomial2021

    • Author(s)
      Yuntao Wang, Yasuhiko Ikematsu, Takanori Yasuda
    • Journal Title

      Symposium on Cryptography and Information Security (SCIS2021)

      Volume: -

    • Related Report
      2020 Research-status Report
  • [Journal Article] Revisiting the Minrank Problem on Multivariate Cryptography2020

    • Author(s)
      Yacheng Wang, Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 12583 Pages: 291-307

    • Related Report
      2020 Research-status Report
    • Peer Reviewed
  • [Journal Article] Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem2020

    • Author(s)
      Yasuhiko Ikematsu, Ryoya Fukasaku, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama
    • Journal Title

      Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography

      Volume: - Pages: 36-44

    • Related Report
      2020 Research-status Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack2020

    • Author(s)
      Yuntao Wang, Yasuhiko Ikematsu, Koichi Akiyama, Tsuyoshi Takagi
    • Journal Title

      Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography

      Volume: - Pages: 28-35

    • Related Report
      2020 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Structual Attack on Bloch-Anti-Circulant UOV at SAC 20192020

    • Author(s)
      Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 12100 Pages: 323-339

    • Related Report
      2020 Research-status Report
    • Peer Reviewed
  • [Presentation] Revisiting the security analysis of SNOVA2024

    • Author(s)
      池松泰彦
    • Organizer
      2024 Symposium on Cryptography and Information Security (SCIS2024)
    • Related Report
      2023 Annual Research Report
  • [Presentation] Revisiting the security analysis against 2F method2023

    • Author(s)
      池松泰彦
    • Organizer
      第 19 回日本応用数理学会研 究部会連合発表会
    • Related Report
      2022 Research-status Report
  • [Presentation] Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability2022

    • Author(s)
      Bagus Santoso, Yasuhiko Ikematsu, Shuhei Nakamura, Takanori Yasuda
    • Organizer
      ISITA 2022
    • Related Report
      2022 Research-status Report
  • [Presentation] A study of the Kipnis-Shamir approach against the Rainbow signature scheme2022

    • Author(s)
      池松泰彦
    • Organizer
      Symposium on Cryptography and Information Security (SCIS2022)
    • Related Report
      2021 Research-status Report
  • [Presentation] Rainbow署名方式に付随するMinRank問題について2022

    • Author(s)
      池松泰彦
    • Organizer
      日本応用数理学会第18回研究部会連合発表会
    • Related Report
      2021 Research-status Report
  • [Presentation] 多変数多項式暗号の最近の進展について2021

    • Author(s)
      池松泰彦
    • Organizer
      金沢暗号理論勉強会
    • Related Report
      2021 Research-status Report
    • Invited
  • [Presentation] Security Analysis on an ElGamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials2021

    • Author(s)
      Yasuhiko Ikematsu
    • Organizer
      Inscrypt2021
    • Related Report
      2021 Research-status Report
    • Int'l Joint Research
  • [Presentation] A study on randomness used in signature generation of UOV2021

    • Author(s)
      Yasuhiko Ikematsu
    • Organizer
      The 7th International Conference on Mathematics and Computing (ICMC2021)
    • Related Report
      2020 Research-status Report
    • Int'l Joint Research
  • [Presentation] Security analysis on an El-Gamal-like multivariate encryption scheme based on a generalization of IP2S problem2021

    • Author(s)
      池松 泰彦
    • Organizer
      Symposium on Cryptography and Information Security (SCIS2021)
    • Related Report
      2020 Research-status Report
  • [Presentation] 耐量子計算機暗号におけるグレブナー基底攻撃の計算量評価について2020

    • Author(s)
      池松 泰彦
    • Organizer
      日本数式処理学会第29回大会
    • Related Report
      2020 Research-status Report
  • [Presentation] A Vulnerability on an Efficient Signature Generation Using Precomputation for UOV2020

    • Author(s)
      池松 泰彦
    • Organizer
      コンピュータセキュリティシンポジウム2020
    • Related Report
      2020 Research-status Report
  • [Presentation] Hybrid meet-in-the-middle attacks for the isogeny path-finding problem2020

    • Author(s)
      Yasuhiko Ikematsu
    • Organizer
      The 7th ACM ASIA Public-Key Cryptography Workshop (APKC 2020)
    • Related Report
      2020 Research-status Report
    • Int'l Joint Research
  • [Presentation] 同種写像パス探索問題に対する中間一致攻撃のハイブリッド手法2020

    • Author(s)
      池松泰彦
    • Organizer
      Symposium on Cryptography and Information Security (SCIS2020)
    • Related Report
      2019 Research-status Report
  • [Presentation] Hybrid meet-in-the-middle attacks for the isogeny path-finding problem2020

    • Author(s)
      Yasuhiko Ikematsu
    • Organizer
      The 12th Workshop among Asian Information Security Labs (WAIS 2020)
    • Related Report
      2019 Research-status Report
  • [Presentation] On the First Fall Degrees of Small Field Type MPKCs2020

    • Author(s)
      中村周平、池松泰彦、王亜成
    • Organizer
      Symposium on Cryptography and Information Security (SCIS2020)
    • Related Report
      2019 Research-status Report
  • [Presentation] Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack2020

    • Author(s)
      Yuntao Wang、Yasuhiko Ikematsu、Koichiro Akiyama、Tsuyoshi Takagi
    • Organizer
      Symposium on Cryptography and Information Security (SCIS2020)
    • Related Report
      2019 Research-status Report
  • [Presentation] A Structural Attack on Block-Anti-Circulant UOV at SAC 20192020

    • Author(s)
      Hiroki Furue、Koha Kinjo、Yasuhiko Ikematsu、Yacheng Wang、Tsuyoshi Takagi
    • Organizer
      Symposium on Cryptography and Information Security (SCIS2020)
    • Related Report
      2019 Research-status Report
  • [Presentation] A Hybrid Method for Solving the Minrank Problem2019

    • Author(s)
      Yacheng Wang, Yasuhiko Ikematsu, Shunhei Nakamura, Tsuyoshi Takagi
    • Organizer
      コンピュータセキュリティシンポジウム2019 (CSS2019)
    • Related Report
      2019 Research-status Report

URL: 

Published: 2019-04-18   Modified: 2025-01-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi