{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:08:35Z","timestamp":1765040915407,"version":"build-2065373602"},"reference-count":26,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T00:00:00Z","timestamp":1552780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Vietnam National University Ho Chi Minh City (VNU-HCM)","award":["C2017-18-03"],"award-info":[{"award-number":["C2017-18-03"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Multivariate Public Key Cryptography (MPKC) is one of the main candidates for post-quantum cryptography, especially in the area of signature schemes. In this paper, we instantiate a certificate Identity-Based Signature (IBS) scheme based on Rainbow, one of the most efficient and secure multivariate signature schemes. In addition, we revise the previous identity-based signature scheme IBUOV based on the Unbalanced Oil and Vinegar (UOV) scheme on the security and choice of parameters and obtain that our scheme is more efficient than IBUOV in terms of key sizes and signature sizes.<\/jats:p>","DOI":"10.3390\/cryptography3010008","type":"journal-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T12:18:53Z","timestamp":1552911533000},"page":"8","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow"],"prefix":"10.3390","volume":"3","author":[{"given":"Le Van","family":"Luyen","sequence":"first","affiliation":[{"name":"Faculty of Mathematics and Computer Science, University of Science, VNU-HCM, 227 Nguyen Van Cu, District 5, Ho Chi Minh City 72711, Vietnam"}]}],"member":"1968","published-online":{"date-parts":[[2019,3,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","article-title":"Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer","volume":"26","author":"Shor","year":"1997","journal-title":"SIAM J. Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_3","unstructured":"Kravitz, D. (1993). Digital Signature Algorithm. (5,231,668), U.S. Patent."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comp."},{"key":"ref_5","unstructured":"(2019, March 17). National Institute of Standards and Technology: Report on Post Quantum Cryptography, Available online: https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/8105\/final."},{"key":"ref_6","unstructured":"(2019, March 17). National Institute of Standards and Technology: Post-Quantum Cryptography\u2014Round 1 Submission, Available online: https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-1-submissions."},{"key":"ref_7","unstructured":"(2019, March 17). National Institute of Standards and Technology: First PQC Standardization Conference, Available online: https:\/\/csrc.nist.gov\/events\/2018\/first-pqc-standardization-conference."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Chen, A.I.T., Chen, M.-S., Chen, T.-R., Cheng, C.-M., Ding, J., Kuo, E.L.-H., Lee, F.Y.-S., and Yang, B.-Y. (2009, January 6\u20139). SSE implementation of multivariate PKCs on modern x86 cpus. Proceedings of the Cryptographic Hardware and Embedded Systems\u2014CHES 2009, Lausanne, Switzerland.","DOI":"10.1007\/978-3-642-04138-9_3"},{"key":"ref_9","unstructured":"Bogdanov, A., Eisenbarth, T., Rupp, A., and Wolf, C. (2008, January 10\u201313). Time-area optimized public-key engines: MQ-cryptosystems as replacement for elliptic curves?. Proceedings of the Cryptographic Hardware and Embedded Systems\u2014CHES 2008, Washington, DC, USA."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Matsumoto, T., and Imai, H. (1988, January 25\u201327). Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland.","DOI":"10.1007\/3-540-45961-8_39"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Patarin, J. (1995, January 27\u201331). Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 88. Proceedings of the 15th Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-44750-4_20"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Kipnis, A., Patarin, L., and Goubin, L. (1999, January 2\u20136). Unbalanced Oil and Vinegar Schemes. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic.","DOI":"10.1007\/3-540-48910-X_15"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ding, J., and Schmidt, D.S. (2005, January 7\u201310). Rainbow, a new multivariate polynomial signature scheme. Proceedings of the Applied Cryptography and Network Security, ACNS 2005, New York, NY, USA.","DOI":"10.1007\/11496137_12"},{"key":"ref_14","unstructured":"Shamir, A. (1984, January 19\u201322). Identity-based cryptosystems and signature schemes. Proceedings of the CRYPTO 1984, Santa Barbara, CA, USA."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","article-title":"Identity based encryption from the Weil pairing","volume":"32","author":"Boneh","year":"2003","journal-title":"SIAM J. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Shen, W., Tang, S., and Xu, L. (2013, January 3\u20135). IBUOV, A Provably Secure Identity-Based UOV Signature Scheme. Proceedings of the 2013 IEEE 16th International Conference on Computational Science and Engineering, CSE 2013, Sydney, Australia.","DOI":"10.1109\/CSE.2013.66"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Sakumoto, K., Shirai, T., and Hiwatari, H. (December, January 29). On provable security of UOV and HFE signature schemes against chosen-message attack. Proceedings of the 4th International Workshop, PQCrypto 2011, Taipei, Taiwan.","DOI":"10.1007\/978-3-642-25405-5_5"},{"key":"ref_18","unstructured":"Joye, M., and Neven, G. (2008). Identity-based Signatures. Identity-Based Cryptography, IOS Press."},{"key":"ref_19","unstructured":"Garey, M.R., and Johnson, D.S. (1979). Computers and Intractability: A Guide to the Theory of NP-Completeness, W.H. Freeman and Company."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Petzoldt, A., Bulygin, S., and Buchmann, J.A. (2010, January 25\u201328). Selecting Parameters for the Rainbow Signature Scheme. Proceedings of the Third International Workshop, PQCrypto 2010, Darmstadt, Germany.","DOI":"10.1007\/978-3-642-12929-2_16"},{"key":"ref_21","unstructured":"Billet, O., and Gilbert, H. (2006, January 6\u20138). Cryptanalysis of Rainbow. Proceedings of the 5th International Conference, SCN 2006, Maiori, Italy."},{"key":"ref_22","unstructured":"Coppersmith, D., Stern, J., and Vaudenay, S. (1993, January 22\u201326). Attacks on the birational permutation signature schemes. Proceedings of the Advances in Cryptology\u2014CRYPTO\u2019 93, Santa Barbara, CA, USA."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ding, J., Yang, B.Y., Chen, C.H.O., Chen, M.S., and Cheng, C.M. (2008, January 3\u20136). New Differential-Algebraic attacks and Reparametrization of Rainbow. Proceedings of the Applied Cryptography and Network Security, ACNS 2008, New York, NY, USA.","DOI":"10.1007\/978-3-540-68914-0_15"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Petzoldt, A., Bulygin, S., and Buchmann, J. (2010, January 12\u201315). CyclicRainbow\u2014A multivariate signature scheme with a partially cyclic public key. Proceedings of the 11th International Conference on Cryptology, Hyderabad, India.","DOI":"10.1007\/978-3-642-17401-8_4"},{"key":"ref_25","unstructured":"Duong, D.H., Van Luyen, L., and Tran, H. (2018). Choosing subfields for LUOV and LRainbow Signature Scheme, Unpublished work."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Beullens, W., and Preneel, B. (2017, January 10\u201313). Field Lifting for Smaller UOV Public Keys. Proceedings of the 18th International Conference on Cryptology, Chennai, India.","DOI":"10.1007\/978-3-319-71667-1_12"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/1\/8\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:38:31Z","timestamp":1760186311000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/1\/8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,17]]},"references-count":26,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,3]]}},"alternative-id":["cryptography3010008"],"URL":"https:\/\/doi.org\/10.3390\/cryptography3010008","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2019,3,17]]}}}