Share This Author
Rainbow, a New Multivariable Polynomial Signature Scheme
This paper proposes and implements a new signature scheme, which is a generalization of the Oil-Vinegar construction to improve the efficiency of the unbalanced Oil and Vinegar signature scheme.
A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem
- Jintai Ding
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
This work uses the learning with errors (LWE) problem to build a new simple and provably secure key exchange scheme and extends the scheme to the ring learning with error problem, resulting in small key size and better efficiency.
Multivariate Public Key Cryptosystems
- Jintai Ding, Albrecht Petzoldt, Dieter Schmidt
- Computer Science, MathematicsAdvances in Information Security
- 10 August 2006
Using Matsumoto-Imai Cryptosystems for Oil-Vinegar Signature Schemes and Hidden Field Equations for Internal Perturbation and Direct Attacks for Direct Attacks.
Authenticated Key Exchange from Ideal Lattices
- Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen
- Computer Science, MathematicsEUROCRYPT
- 26 April 2015
A practical and provably secure two-pass authenticated key exchange protocol over ideal lattices, which is conceptually simple and has similarities to the Diffie-Hellman based protocols such as HMQV and OAKE.
Design Principles for HFEv- Based Multivariate Signature Schemes
- Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, Jintai Ding
- Computer Science, MathematicsASIACRYPT
- 29 November 2015
The new HFEv- based signature scheme Gui is proposed, which is more than 100 times faster than QUARTZ and therefore highly comparable with classical signature schemes such as RSA and ECDSA.
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation
- Jintai Ding
- Computer Science, MathematicsPublic Key Cryptography
- 1 March 2004
This paper proposes a new variant of the MI system, which was inspired by the idea of “perturbation”, and a practical implementation example of 136 bits, its security analysis and efficiency analysis are presented.
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
- M. S. Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, J. Buchmann
- Computer SciencePQCrypto
- 17 October 2008
This paper proposes two substantial improvements to this algorithm over GF(2) that result in significantly reduced memory usage and presents experimental results comparing MXL2 to the XL algorithm, the MutantXL algorithm and Magma's implementation of F 4.
New Differential-Algebraic Attacks and Reparametrization of Rainbow
- Jintai Ding, Bo-Yin Yang, Chiamei Chen, Ming-Shing Chen, Chen-Mou Cheng
- Computer Science, MathematicsACNS
- 3 June 2008
This paper exhibits similar algebraic and diffential attacks, that will reduce published Rainbow-like schemes below their security levels, and discusses how parameters for Rainbow and TTS schemes should be chosen for practical applications.
Inoculating Multivariate Schemes Against Differential Attacks
This work demonstrates how to prevent differential attacks on multivariate public key cryptosystems using the Plus (+) method of external perturbation, and prescribes a new scheme that has the additional benefit of resolving the problem of finding the true plaintext among several preimages of a given ciphertext.
SECURITY OF HOMOMORPHIC ENCRYPTION
All 6 general-purpose libraries for homomorphic encryption were based on RLWE-based systems (Ring Learning With Errors), and all libraries implemented one of two encryption schemes and also displayed common choices for the underlying ring, error distribution, and parameter selection.