METHOD AND APPARATUS FOR PUBLIC-KEY CRYPTOGRAPHY BASED ON STRUCTURED MATRICES

20210152348 · 2021-05-20

    Inventors

    Cpc classification

    International classification

    Abstract

    A method of generating a public key and a secret key using a key generator is disclosed. The method includes acquiring an affine map and a secret central map, and generating a public key and a secret key using the affine map and the secret central map, in which the secret central map is expressed as a system of o multivariate quadratic polynomials, the system of o multivariate quadratic polynomials can be expressed as a structured matrix or a product of a submatrix of a structured matrix and a vector when v linear equations and v variables defined on a finite field are given.

    Claims

    1. A method of generating a public key and a secret key using a key generator comprising: acquiring an affine map {tilde over (T)} and a map (custom-character:custom-charactertext missing or illegible when filed.sup.n.fwdarw.custom-character.sub.q.sup.m); and generating a public key (custom-character=custom-character∘T) and a secret key (custom-character, {tilde over (T)}) and a secret key using the affine map and the map, wherein the map (custom-character:custom-charactertext missing or illegible when filed.sup.n.fwdarw.custom-character.sub.q.sup.m) is expressed as a system (custom-character.sub.V.sup.(1), . . . , custom-character.sub.V.sup.(o)) of O multivariate quadratic polynomials, the system (custom-character.sub.V.sup.(1), . . . , custom-character.sub.V.sup.(o)) of O multivariate quadratic polynomials is expressed as below when υ linear polynomials (L.sub.1, . . . , L.sub.υ) and υ variables (χ.sub.1, . . . , χ.sub.υ) defined on a finite field custom-character.sub.q are given, .Math. ( V ( 1 ) V ( 2 ) .Math. ? ) = ( x 1 x 2 .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. ) .Math. ( L 1 L 2 .Math. ? ) = M V .Math. ( L 1 L 2 .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed wherein, T:custom-character.sub.q.sup.n.fwdarw.custom-character.sub.q.sup.n, {tilde over (T)}=T.sup.−1, M.sub.V is a structured matrix or a submatrix of a structured matrix,
    m=o,
    V={1, . . . , υ},
    O={υ+1, . . . , υ+o}, |V|=υ, |O|=o, V is an index set for defining Vinegar variables, and O is an index set for defining Oil variables.

    2. The method of claim 1, wherein, when the system (custom-character.sub.V.sup.(1), . . . , custom-character.sub.V.sup.(o)) of O multivariate quadratic polynomials is expressed as below .Math. ( V ( 1 ) V ( 2 ) .Math. ? ) = ( x 1 x 2 .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. ) .Math. ( L 1 L 2 .Math. ? ) = M V .Math. ( L 1 L 2 .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed M.sub.V herein is a circulant matrix or a submatrix of a circulant matrix.

    3. A computer program which is stored in a storage medium to perform the method of generating a public key and a secret key of claim 1.

    4. An electronic signer comprising the key generator configured to perform the method of generating a public key and a secret key of claim 1, wherein the electronic signer further comprises: a signature generator configured to generate an electronic signature σ of a message M using the affine map {tilde over (T)}, the map custom-character, and the message M; and a signature verifier configured to verify the electronic signature σ using the message M, the electronic signature σ, and the public key (custom-character=custom-character∘T), wherein the signature generator configured to calculate a hash message (H(M)=ξ) for the message M, and calculate a solution (s=(s.sub.1, . . . , s.sub.n)) of custom-character(x)=ξ using custom-character.sup.−1(ξ)=s when ξ=(ξ.sub.1, . . . , ξ.sub.m) is given, and calculates {tilde over (T)}(s)=σ, signature verifier determines whether P(σ)=H(M) and verify the electronic signature σ according to a result of the determination,
    H:{0,1}*.fwdarw.custom-character.sub.q.sup.m,
    and
    H(M)=ξ=(ξ.sub.1, . . . , ξ.sub.m)∈custom-character.sub.q.sup.m.

    5. A method of generating a public key and a secret key using a key generator comprising: acquiring an affine map {tilde over (T)} and a map (custom-character:custom-charactertext missing or illegible when filed.sup.n.fwdarw.custom-character.sub.q.sup.m); and generating a public key (custom-character=custom-character∘T) and a secret key (custom-character, {tilde over (T)}) using the affine map and the map, wherein the map (custom-character:custom-charactertext missing or illegible when filed.sup.n.fwdarw.custom-character.sub.q.sup.m) is expressed as a system (custom-character.sub.OV.sup.(1), . . . , custom-character.sub.OV.sup.(o)) of O multivariate quadratic polynomials, the system (custom-character.sub.OV.sup.(1), . . . , custom-character.sub.OV.sup.(o)) of O multivariate quadratic polynomials is expressed as below when υ variables (χ.sub.1, . . . , χ.sub.υ) and O variables (χ.sub.υ+1, χ.sub.υ+2, . . . , χ.sub.υ+o) defined on a finite field (custom-character.sub.q) are given ( OV ( o 1 + 1 ) OV ( o 1 + 2 ) .Math. OV ( o 1 + o 2 ) ) = ( v T .Math. a 11 v .Math. T .Math. a 12 .Math. ? v T .Math. a 21 v .Math. T .Math. a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B ( ? ? .Math. ? ) = ( v .Math. T 0 .Math. 0 0 v T .Math. 0 .Math. .Math. .Math. 0 0 .Math. v T ) .Math. ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? a 11 .Math. ? ) .Math. ( ? ? .Math. ? ) + B ( ? ? .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 21 ] wherein, .Math. B = ( b 11 b 12 .Math. ? b 21 b 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) , M OV = ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) , .Math. .Math. v T = [ x 1 x 2 .Math. x v ] , .Math. .Math. ? .Math. indicates text missing or illegible when filed T:custom-character.sub.q.sup.n.fwdarw.custom-character.sub.q.sup.n, {tilde over (T)}=T.sup.−1, and, when each column vector a.sub.ij is regarded as an element of one matrix, each column vector a.sub.ij is selected such that M.sub.OV is a structured matrix and element values of b.sub.ij are selected such that B is also a structured matrix of the same form as M.sub.OV.

    6. The method of claim 5, when o(=2k) is an even number, M.sub.OV is a block circulant matrix of vectors when M.sub.OV is expressed as below, M OV = ( a 11 a 21 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) = ( p 1 p 2 .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ) = ( P Q R S ) ? .Math. indicates text missing or illegible when filed each of p.sub.i, q.sub.i, s.sub.i, r.sub.i is a column vector having a size υ, each of P, Q, R, S is a circulant matrix of vectors, and B is a block circulant matrix when B is expressed as below B = ( b 11 b 12 .Math. ? b 21 b 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) = ( t 1 t 2 .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ) . .Math. ? .Math. indicates text missing or illegible when filed

    7. A computer program that is stored in a storage medium for performing the method of generating a public key and a secret key of claim 5.

    8. An electronic signer, comprising the key generator configured to perform the method of generating a public key and a secret key of claim 5, wherein the electronic signer further comprises: a signature generator configured to generate an electronic signature σ of a message M using the affine map {tilde over (T)}, the map custom-character, and the message M; and a signature verifier configured to verify the electronic signature σ using the message M, the electronic signature σ, and the public key (custom-character=custom-character∘T), wherein the signature generator configured to calculate a hash message H(M)=ξ for the message M, calculate a solution (s=(s.sub.1, . . . , s.sub.n) of custom-character(x)=ξ using custom-character.sup.−1(ξ)=s when ξ=(ξ.sub.1, . . . , ξ.sub.m) is given, and calculates {tilde over (T)}(s)=σ, the signature verifier determines whether P(σ)=H(M) and verify the electronic signature σ according to a result of the determination,
    H:{0,1}*.fwdarw.custom-character.sub.q.sup.m,
    and
    H(M)=ξ=(ξ.sub.1, . . . , ξ.sub.m)∈custom-character.sub.q.sup.m.

    9. A method of generating a public key and a secret key using a key generator comprising: acquiring a first affine map {tilde over (S)}, a second affine map {tilde over (T)}, and a map (custom-character:custom-charactertext missing or illegible when filed.sup.n.fwdarw.custom-character.sub.q.sup.m); and generating a public key custom-character=S∘custom-character∘T and a secret key ({tilde over (S)}, custom-character, {tilde over (T)}) using the first affine map, the second affine map, and the map, wherein, the map (custom-character:custom-charactertext missing or illegible when filed.sup.n.fwdarw.custom-character.sub.q.sup.m) is expressed as a system (custom-character=custom-charactertext missing or illegible when filed, . . . , custom-character.sup.(m)) of multivariate quadratic polynomials having m=o.sub.1+o.sub.2 polynomials and n=υ+m variables, custom-character.sup.(i) for i=1, . . . , o.sub.1 is expressed as below, .Math. { ? .Math. ( ? , .Math. .Math. , ? ) = ? .Math. ( x 1 , .Math. .Math. , ? ) + ? .Math. ( x 1 , .Math. .Math. , ? ) + ? , ? .Math. ( ? , .Math. .Math. , ? ) = ? .Math. ( x 1 , .Math. .Math. , ? ) + ? .Math. ( x 1 , .Math. .Math. , ? ) + ? .Math. .Math. ? .Math. indicates text missing or illegible when filed custom-character.sub.V.sup.(i) for i=1, . . . , o.sub.1 is expressed as below when υ linear equations (L.sub.1, . . . , L.sub.υ) and υ variables (χ.sub.1, . . . , χ.sub.υ) defined on a finite field custom-character.sub.q are given .Math. ( V ( 1 ) V ( 2 ) .Math. ? ) = ( x 1 x 2 .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. ) .Math. ( L 1 L 2 .Math. ? ) = M V .Math. ( L 1 L 2 .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed wherein, M.sub.V.sup.1 is a structured matrix or a submatrix of a structured matrix, custom-character.sup.(i) for i=o.sub.1+1, . . . , m is expressed as below, .Math. { ? .Math. ( ? , .Math. .Math. , ? ) = ? .Math. ( x 1 , .Math. .Math. , ? ) + ? .Math. ( x 1 , .Math. .Math. , ? ) + ? ? .Math. ( ? , .Math. .Math. , ? ) = ? .Math. ( x 1 , .Math. .Math. , ? ) + ? .Math. ( x 1 , .Math. .Math. , ? ) + ? , .Math. ? .Math. indicates text missing or illegible when filed custom-character.sub.V.sup.(i) for i=o.sub.1+1, . . . , m is expressed as below when linear equations (L′.sub.1, . . . , L′.sub.υ+o.sub.1) with υ+o.sub.1 variables and υ+o.sub.1 variables and ‘ ’ variables are given .Math. ( ? ? .Math. ? ) = ( x 1 x 2 .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. ) .Math. ( L 1 L 2 .Math. ? ) = M V 2 .Math. ( L 1 L 2 .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed wherein, M.sub.V.sup.2 is a structured matrix or a submatrix of a structured matrix,
    m=o.sub.1+o.sub.2,
    S:custom-character.sub.q.sup.m.fwdarw.custom-character.sub.q.sup.m, T:custom-character.sub.q.sup.n.fwdarw.custom-character.sub.q.sup.n, {tilde over (S)}=S.sup.−1, {tilde over (T)}=T.sup.−1,
    V={1, . . . , υ},
    O.sub.1={υ+1, . . . , υ+o.sub.1},
    O.sub.2={υ+o.sub.1+1, . . . , υ+o.sub.1+o.sub.2}, which |V|=υ, i=|O.sub.i|=o.sub.i for 1 and 2, V is an index set for defining Vinegar variables, and O.sub.1 and O.sub.2 are index sets for defining Oil variables.

    10. The method of claim 9, wherein, when the map (custom-character:custom-charactertext missing or illegible when filed.sup.n.fwdarw.custom-character.sub.q.sup.m) is expressed as a system (custom-character=custom-charactertext missing or illegible when filed, . . . , custom-character.sup.(m)) of multivariate quadratic polynomials having m=o.sub.1+o.sub.2 polynomials and n=υ+m variables, custom-character.sub.V.sup.(i) for i=1, . . . , o.sub.1 is expressed as below .Math. ( V ( 1 ) V ( 2 ) .Math. ? ) = ( x 1 x 2 .Math. ? ? x 1 .Math. ? .Math. .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( L 1 L 2 .Math. ? ) = M V 1 .Math. ( L 1 L 2 .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed wherein, M.sub.V.sup.1 is a circulant matrix or a submatrix of a circulant matrix, custom-character.sup.(i) for i=o.sub.1+1, . . . , m is expressed as below .Math. { ? ) + ? ? , .Math. ? .Math. indicates text missing or illegible when filed custom-character.sub.V.sup.(i) for i=o.sub.1+1, . . . , m is expressed as below .Math. ( ? ? .Math. ? ) = ( ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. ? ? .Math. ? ) .Math. ? .Math. ( ? ? .Math. ? ) = M V 2 ( ? ? .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed wherein, M.sub.V.sup.2 is a circulant matrix or a submatrix of a circulant matrix.

    11. A computer program that is stored in a storage medium for performing the method of generating a public key and a secret key of claim 9.

    12. An electronic signer comprising the key generator configured to perform the method of generating a public key and a secret key of claim 9, wherein the electronic signer further comprises: a signature generator configured to generate an electronic signature σ of a message M using the first affine map ({tilde over (S)}), the second affine map ({tilde over (T)}), the map (custom-character), and the message M; and a signature verifier configured to verify the electronic signature σ using the message M, the electronic signature σ, and the public key (custom-character=S∘custom-character∘T), wherein the signature generator configured to calculate a hash message H(M) for the message M, calculate {tilde over (S)}(H(M))=ξ=(ξ.sub.1, . . . , ξ.sub.m)∈custom-character.sub.q.sup.m, calculate a solution (s=(s.sub.1, . . , s.sub.n)) of custom-character(x)=ξ using custom-character.sup.−1(ξ)=s when ξ=(ξ.sub.1, . . . , ξ.sub.m) is given, and calculate {tilde over (T)}(s)=σ, the signature verifier configured to determine whether P(σ)=H(M) and verify the electronic signature σ according to a result of the determination, and
    H:{0, 1}*.fwdarw.custom-character.sub.q.sup.m.

    13. The electronic signer of claim 12, wherein, when a matrix R given for randomization of the first affine map {tilde over (S)} in a product {tilde over (S)}.Math.h of a vector h of custom-character.sub.q.sup.m and the first affine map {tilde over (S)} is a circulant matrix, the signature generator calculates {tilde over (S)}(H(M)) using an equation below
    {tilde over (S)}(H(M))=({tilde over (S)}+R)(H(M))−R(H(M)).

    14. The electronic signer of claim 12, wherein, when the matrix R given for the randomization of the first affine map {tilde over (S)} in the product {tilde over (S)}.Math.h of the vector h of custom-character.sub.q.sup.m and the first affine map {tilde over (S)} is a circulant matrix, the signature generator calculates {tilde over (S)}(H(M)) using an equation below
    {tilde over (S)}(H(M))=({tilde over (S)}.Math.R.sup.−1.Math.R)(H(M)).

    15. A method of generating a public key and a secret key using a key generator comprising: acquiring a first affine map ({tilde over (S)}), a second affine map ({tilde over (T)}), and a map (custom-character:custom-charactertext missing or illegible when filed.sup.n.fwdarw.custom-character.sub.q.sup.m); and generating a public key (custom-character=S∘custom-character∘T) and a secret key ({tilde over (S)}, custom-character, {tilde over (T)}) using the first affine map, the second affine map, and the map, wherein the map (custom-character:custom-charactertext missing or illegible when filed.sup.n.fwdarw.custom-character.sub.q.sup.m) is expressed as a system (custom-character=custom-charactertext missing or illegible when filed, . . . , custom-character.sup.(m)) of m=o.sub.1+o.sub.2 multivariate quadratic polynomials, a system (custom-character.sub.OV.sup.(1), . . . , custom-character.sub.OV.sup.(o.sup.1.sup.)) of the O.sub.1 multivariate quadratic polynomials is expressed as below when υ variables (χ.sub.1, . . . , χ.sub.υ) and O.sub.1 variables (χ.sub.υ+1, χ.sub.υ+2, . . . , χ.sub.υ+o.sub.1) defined on a finite field custom-character.sub.q are given ( OV ( 1 ) OV ( 2 ) .Math. ? ) = ( v T .Math. a 11 v T .Math. a 12 .Math. ? v T .Math. a 21 v T .Math. a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B 1 ( ? ? .Math. ? ) = ( v T 0 .Math. 0 0 v T .Math. 0 .Math. .Math. .Math. 0 0 .Math. v T ) .Math. ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B 1 ( ? ? .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed wherein .Math. M OV , 1 = ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. .Math. and .Math. .Math. B 1 ( b 11 b 12 .Math. ? b 21 b 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) ? .Math. indicates text missing or illegible when filed are given,
    v.sup.T=[χ.sub.1χ.sub.2 . . . χ.sub.υ], each column vector a.sub.ij is selected such that M.sub.OV,1 is a structured matrix and element values of b.sub.ij are selected such that B.sub.1 is also a structure matrix of the same form as M.sub.OV,1, when each column vector a.sub.ij is regarded as elements of one matrix, and custom-character.sub.OV.sup.(i) for i=o.sub.1+1, . . . , m is given as below, ( ? ? .Math. ? ) = ( ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B 1 ( ? ? .Math. ? ) = ( v T 0 .Math. 0 0 v T .Math. 0 .Math. .Math. .Math. 0 0 .Math. v T ) .Math. ( ? ? .Math. ? ? .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B 1 ( ? ? .Math. ? ) ? .Math. indicates text missing or illegible when filed wherein, .Math. M OV , 2 = ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. .Math. and .Math. .Math. B 2 ( b 11 b 12 .Math. ? b 21 b 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) ? .Math. indicates text missing or illegible when filed are given,
    v′.sup.T=[χ.sub.1χ.sub.2 . . . χ.sub.υ+o.sub.1], each column vector a′.sup.ij is selected such that M.sub.OV,2 is a structured matrix and element values of b′.sub.ij are selected such that B.sub.2 is also a structured matrix of the same form as M.sub.OV,2, when each column vector (a′.sub.ij) is regarded as an element of one matrix, S:custom-character.sub.q.sup.m.fwdarw.custom-character.sub.q.sup.m, T:custom-character.sub.q.sup.n.fwdarw.custom-character.sub.q.sup.n, {tilde over (S)}=S.sup.−1, and {tilde over (T)}=T.sup.−1.

    16. The method of claim 15, wherein, when o.sub.1=2k.sub.1 and o.sub.2=2k.sub.2 are given, F.sub.OV.sup.(i) for i=1, . . . , o.sub.1 is expressed as below ( ? ? .Math. ? ) = ( ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B 1 ( ? ? .Math. ? ) = ( v T 0 .Math. 0 0 v T .Math. 0 .Math. .Math. .Math. 0 0 .Math. v T ) .Math. ( ? ? .Math. ? a 21 ? .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B 1 ( ? ? .Math. ? ) ? .Math. indicates text missing or illegible when filed wherein, ? = ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) = ( p 1 p 2 .Math. ? q 1 q 2 .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. p 2 p 1 .Math. ? ? ? .Math. q 1 ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? .Math. ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. r 2 r 3 .Math. r 1 s 1 s 2 .Math. ? ) = ( ? Q 1 R 1 S 1 ) , .Math. ? .Math. indicates text missing or illegible when filed each of p.sub.i, q.sub.i, s.sub.i, r.sub.i is a column vector having the size υ, each of P.sub.1, Q.sub.1, R.sub.1, S.sub.1 is a circulant matrix of vectors, M.sub.OV,1 is a block circulant matrix of vectors ? = ( b 11 b 12 .Math. ? b 21 b 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) = ( ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. q 1 ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? .Math. ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. r 2 r 3 .Math. ? ? ? .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed B.sub.1 is block circulant matrix, custom-character.sub.OV.sup.(i) for i=o.sub.1+1, . . . , m is expressed as below ( ? ? .Math. ? ) = ( ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B 2 ( ? ? .Math. ? ) = ( v T 0 .Math. 0 0 v T .Math. 0 .Math. .Math. .Math. 0 0 .Math. v T ) .Math. ( ? ? .Math. ? a 21 ? .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B 2 ( ? ? .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed wherein, M OV .Math. .Math. 2 = ( ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) = ( ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? .Math. ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ) = ( ? Q 2 R 2 S 2 ) , .Math. ? .Math. indicates text missing or illegible when filed p′.sub.i, q′.sub.i, s′.sub.i, r′.sub.i are column vectors each having the size (υ+o.sub.1), each of P.sub.2, Q.sub.2, R.sub.2, S.sub.2 is a circulant matrix of vectors, M.sub.OV,2 is a block circulant matrix of vectors, ? = ( V 11 V 12 .Math. ? V 21 V 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) = ( ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? .Math. ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ) .Math. .Math. ? .Math. indicates text missing or illegible when filed B.sub.2 is a block circulant matrix, and m=o.sub.1+o.sub.2.

    17. The method of claim 16, wherein, when υ linear equations (L.sub.1, . . . , L.sub.υ) and υ variables (χ.sub.1, . . . , x.sub.υ) defined on the finite field are given, custom-character.sub.V.sup.(i) for i=1, . . . , o.sub.1 is expressed as below, .Math. ( V ( 1 ) V ( 2 ) .Math. ? ) = ( x 1 x 2 .Math. ? ? x 1 .Math. ? .Math. .Math. .Math. .Math. ? ? ? ? ) .Math. ( L 1 L 2 .Math. ? ) = ? .Math. ( L 1 L 2 .Math. ? ) ? .Math. indicates text missing or illegible when filed wherein, M.sub.V.sup.1 is a circulant matrix or a submatrix of a circulant matrix, custom-character.sub.V.sup.(i) for i=o.sub.1+1, . . . , m is expressed as below when linear equations (L′.sub.1, . . . , L′.sub.υ+o.sub.1) with υ+o.sub.1 variables and υ+o.sub.1 variables are given .Math. ( ? ? .Math. ? ) = ( x 1 x 2 .Math. ? ? x 1 .Math. ? .Math. .Math. .Math. .Math. ? ? ? ? ) .Math. ( L 1 L 2 .Math. ? ) = ? .Math. ( L 1 L 2 .Math. ? ) , .Math. ? .Math. indicates text missing or illegible when filed wherein, M.sub.V.sup.2 is a circulant matrix or a submatrix of a circulant matrix, custom-character.sup.(i) for i=1, . . . , m is expressed as below, .Math. { ? .Math. ( x 1 , .Math. .Math. , ? ) = ? .Math. ( x 1 , .Math. .Math. , ? ) + ? .Math. ( x 1 , .Math. .Math. , ? ) + ? , ? .Math. ( x 1 , .Math. .Math. , ? ) = ? .Math. ( x 1 , .Math. .Math. , ? ) + ? .Math. ( x 1 , .Math. .Math. , ? ) + ? , .Math. .Math. .Math. { ? .Math. ( x 1 , .Math. .Math. , ? ) = ? .Math. ( x 1 , .Math. .Math. , ? ) + ? .Math. ( x 1 , .Math. .Math. , ? ) + ? , ? .Math. ( x 1 , .Math. .Math. , ? ) = ? .Math. ( x 1 , .Math. .Math. , ? ) + ? .Math. ( x 1 , .Math. .Math. , ? ) + ? , .Math. .Math. ? .Math. indicates text missing or illegible when filed and m=o.sub.1+o.sub.2.

    18. A computer program that is stored in a storage medium for performing the method of generating a public key and a secret key of claim 15.

    19. An electronic signer comprising the key generator configured to perform the method of generating a public key and a secret key of claim 15, wherein the electronic signer further comprises: a signature generator configured to generate an electronic signature σ of a message M using the first affine map ({tilde over (S)}), the second affine map ({tilde over (T)}), the map (custom-character), and the message M; and a signature verifier configured to verify the electronic signature σ using the message M, the electronic signature σ, and the public key (custom-character=S∘custom-character∘T), wherein the signature generator configured to calculate a hash message H(M) for the message M, calculate {tilde over (S)}(H(M))=ξ=(ξ.sub.1, . . . , ξ.sub.m)∈custom-character.sub.q.sup.m, calculate a solution (s=(s.sub.1, . . . , s.sub.n)) of custom-character(x)=ξ using custom-character.sup.−1(ξ)=s when ξ=(ξ.sub.1, . . . , ξ.sub.m) is given, and calculate {tilde over (T)}(s)=σ, the signature verifier configured to determine whether P(σ)=H(M), and verify the electronic signature σ according to a result of the determination, and
    H:{0, 1}*.fwdarw.custom-character.sub.q.sup.m.

    20. The electronic signer of claim 19, wherein, when a matrix R given for randomization of the first affine map {tilde over (S)} in a product {tilde over (S)}.Math.h of a vector h of custom-character.sub.q.sup.m and the first affine map ({tilde over (S)}) is a circulant matrix, the signature generator calculates {tilde over (S)}(H(M)) using an equation below
    {tilde over (S)}(H(M))=({tilde over (S)}+R)(H(M))−R(H(M)).

    21. The electronic signer of claim 19, wherein, when the matrix R given for randomization of the first affine map {tilde over (S)} in a product {tilde over (S)}.Math.h of a vector h of custom-character.sub.q.sup.m and the first affine map ({tilde over (S)}) is a circulant matrix, the signature generator calculates {tilde over (S)}(H(M)) using an equation below
    {tilde over (S)}(H(M))=({tilde over (S)}.Math.R.sup.−1.Math.R)(H(M)).

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0013] FIG. 1 is a block diagram of an electronic signer based on multivariate quadratic polynomials with one layer according to embodiments of the present invention;

    [0014] FIG. 2 is a flowchart for describing an operation of the electronic signer based on multivariate quadratic polynomials shown in FIG. 1;

    [0015] FIG. 3 is a block diagram of an electronic signer based on multivariate quadratic polynomials with two layers according to embodiments of the present invention; and

    [0016] FIG. 4 is a flowchart for describing an operation of the electronic signer based on multivariate quadratic polynomials shown in FIG. 3.

    DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

    [0017] In the present specification, an electronic signature algorithm (or an apparatus, a method, and/or a computer program stored in a storage medium capable of performing the electronic signature algorithm) based on a generation of systems of multivariate quadratic polynomials (or equations), which can be expressed by a product of a structured matrix (or a submatrix of the structured matrix) and a vector after performing a suitable operation or operations, is disclosed.

    [0018] 1. Generation of O (here, O is a natural number) quadratic polynomials which can be expressed by product of structured matrix or submatrix of structured matrix and vector using υ (Here, υ is a natural number) linear polynomials and υ variables (here, χ.sub.i, 1≤i≤υ).

    [0019] When custom-character.sub.q is a finite field with q (here, q is a natural number) elements, and υ linear polynomials (L.sub.1, . . . , L.sub.υ) and υ variables (χ.sub.1, . . . , χ.sub.υ) defined on the finite field (custom-character.sub.q) are given, a system (custom-character.sub.V.sup.(1), . . . , custom-character.sub.V.sup.(o)) of O quadratic polynomials, which can be expressed in a form of a product of a structured matrix (or a submatrix of a structured matrix) and a vector as shown in Equation 1 is generated.

    [0020] The system (custom-character.sub.V.sup.(1), . . . , custom-character.sub.V.sup.(o)) of quadratic polynomials will be expressed by Equation 1, in which M.sub.V is defined as a structured matrix (or a submatrix of a structured matrix).

    [00012] ( V ( 1 ) V ( 2 ) .Math. V ( o ) ) = ( x 1 x 2 .Math. x o .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. .Math. ) .Math. ( L 1 L 2 .Math. L v ) = M v .Math. ( L 1 L 2 .Math. L v ) [ Equation .Math. .Math. 1 ]

    [0021] Here, the structure matrix includes a case in which complexity of the product of a structured matrix (or a submatrix of a structured matrix) and a vector is less than or equal to O(υ.sup.2).

    1-1. Structured Matrix is Circulant Matrix

    [0022] When υ linear polynomials (L.sub.1, . . . , L.sub.υ) and υ variables (χ.sub.1, . . . , χ.sub.υ) are given to an apparatus or a computer program, a system (custom-character.sub.V.sup.(1), . . . , custom-character.sub.V.sup.(o)) of O quadratic polynomials is generated as shown in Equation 2. Here, O is the number of quadratic polynomials, which is represented as O when there is one layer, and, when there are two layers, a first layer thereof is represented as O.sub.1 and a second layer is represented as O.sub.2.

    [00013] .Math. V ( 1 ) = x 1 .Math. L 1 + x 2 .Math. L 2 + .Math. + ? .Math. ? .Math. .Math. .Math. V ( 2 ) = ? .Math. L 1 + x 1 .Math. L 2 + .Math. + ? .Math. ? .Math. .Math. .Math. .Math. , .Math. .Math. V ( o ) = ? .Math. L 1 + ? .Math. L 2 + .Math. + ? .Math. ? .Math. .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 2 ]

    [0023] The system of quadratic polynomials in Equation 2 needs to be expressed in the form of a product of a circulant matrix (or a submatrix of a circulant matrix) and a vector as shown in Equation 3. That is, M.sub.V in Equation 3 is a circulant matrix or a submatrix of a circulant matrix.

    [00014] .Math. ( V ( 1 ) V ( 2 ) .Math. ? ) = ( x 1 x 2 .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( L 1 L 2 .Math. ? ) = M V .Math. ( L 1 L 2 .Math. ? ) .Math. .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 3 ]

    1-2. Additional Generation of System of Quadratic Equations Expressed by Block Circulant Matrix

    [0024] After quadratic polynomials for variables (χ.sub.1, . . . , X.sub.υ) are selected as described in 1-1, a system (custom-character.sub.OV.sup.(1), . . . , custom-character.sub.OV.sup.(o)) of quadratic polynomials for o(=2k) (Here, k is a natural number) variables (χ.sub.υ+1, χ.sub.υ+2, . . . , χ.sub.υ+o) is additionally generated as shown in Equation 4.

    [00015] ( OV ( 1 ) OV ( 2 ) .Math. ? ) = ( v T .Math. a 11 v T .Math. a 12 .Math. ? v T .Math. a 21 v T .Math. a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B ( ? ? .Math. ? ) = ( v T 0 .Math. ? 0 v T .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B ( ? ? .Math. ? ) .Math. .Math. M OV = ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) = ( ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ) = ( P ? ? S ) .Math. .Math. B = ( b 11 b 12 .Math. ? b 21 b 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) = ( ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ) .Math. .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 4 ]

    [0025] Here v.sup.T=[χ.sub.1 χ.sub.2 . . . χ.sub.υ], each of P, Q, R, S is a circulant matrix of vectors, M.sub.OV is a block circulant matrix of the vectors, and B is also a block circulant matrix with the same structure as M.sub.OV.

    [0026] A system of quadratic equations such as in Equation 5 without quadratic terms that satisfy χ.sub.iχ.sub.j, i, j=υ+1, .. . , υ+o (here, each of i and j is a natural number) is generated by combining the system of quadratic polynomials in Equation 4 and the system of quadratic polynomials in Equation 2. Here, δ.sub.i is a constant term selected in the finite field (custom-character.sub.q).

    [00016] .Math. { ( 1 ) ( ? ) = V ( 1 ) ( ? ) + OV ( 1 ) ( ? ) + ? .Math. ( o ) ( ? ) = V ( o ) ( ? ) .Math. ? + OV ( o ) ( ? ) + ? .Math. .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 5 ]

    2. Generation of System of Quadratic Equations in Which Coefficient Matrix Has Structured Matrix Structure

    [0027] In a system of quadratic polynomials having n=υ+o (n is a natural number) variables which can be expressed as shown in equation 6, it is assumed that there is a system (custom-character.sub.OV.sup.(i)) of quadratic polynomials for υ variables (χ.sub.1, . . . , χ.sub.υ) and O variables (χ.sub.υ+1, χ.sub.υ+2, . . . , χ.sub.υ+o).

    [00017] ( OV ( 1 ) OV ( 2 ) .Math. ? ) = ( v T .Math. a 11 v T .Math. a 12 .Math. ? v T .Math. a 21 v T .Math. a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B ( ? ? .Math. ? ) = ( v T 0 .Math. ? 0 v T .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B ( ? ? .Math. ? ) .Math. .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 6 ]

    Here, v.sup.T=[χ.sub.1 χ.sub.2 . . . χ.sub.υ], and B and M.sub.OV are expressed as shown in Equation 7.

    [00018] .Math. B = ( b 11 b 12 .Math. ? b 21 b 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) , M OV = ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 7 ]

    [0028] Here, when each column vector a.sub.ij is regarded as an element of one matrix, each column vector a.sub.ij is selected such that M.sub.OV is a structured matrix, element values of b.sub.ij are selected such that B is a structure matrix of the same form as M.sub.OV, thereby a system of desired quadratic polynomials is generated.

    [0029] Here, the structured matrix includes a case in which complexity of obtaining an existing structured matrix or inverse matrix, or finding a solution of a system of a linear equation having a structured matrix as a coefficient matrix is less than or equal to O(n.sup.2). At this time, a size of the coefficient matrix of the system of a linear equation is n×n.

    2-1. M.SUB.OV .and B Are Block Circulant Matrices (BC).

    [0030] When (o=2k) is an even number, M.sub.OV and B are selected such that M.sub.OV and B are block circulant matrices, respectively, as shown in Equations 8 and 9.

    [00019] M OV = ( a 11 a 12 .Math. a ? a 21 a 22 .Math. a ? .Math. .Math. .Math. a o .Math. 1 a o .Math. 2 .Math. a ? ) = ( p 1 p 2 .Math. p k q 1 q 2 .Math. q k p k p 1 .Math. p k - 1 q k q 1 .Math. q k - 1 .Math. .Math. .Math. .Math. .Math. .Math. p 2 p 3 .Math. p 1 q 2 q 3 .Math. q 1 r 1 r 2 .Math. r k s 1 s 2 .Math. s k r k r 1 .Math. r k - 1 s k s 1 .Math. s k - 1 .Math. .Math. .Math. .Math. .Math. .Math. r 2 r 3 .Math. r 1 s 2 s 3 .Math. s 1 ) = ( P Q R S ) .Math. .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 8 ]

    Here, each of P, Q, R, S is a circulant matrix of vectors, and M.sub.OV is a block circulant matrix of the vectors.

    [00020] B = ( b 11 b 12 .Math. b b 21 b 22 .Math. b .Math. .Math. .Math. b o .Math. 1 b o .Math. 2 .Math. b oo ) = ( t 1 t 2 .Math. t k u 1 u 2 .Math. u k t k t 1 .Math. t k - 1 u k u 1 .Math. u k - 1 .Math. .Math. .Math. .Math. .Math. .Math. t 2 t 3 .Math. t 1 u 2 u 3 .Math. u 1 v 1 v 2 .Math. v k w 1 w 2 .Math. w k v k v 1 .Math. v k - 1 w k w 1 .Math. w k - 1 .Math. .Math. .Math. .Math. .Math. .Math. v 2 v 3 .Math. v 1 w 2 w 3 .Math. w 1 ) [ Equation .Math. .Math. 9 ]

    Here, B is a block circulant matrix.

    2-2. Method of Efficiently Calculating Inverse Matrix (BC.SUP.−1.) of Given Block Circulant Matrix (BC)

    [0031] A block determinant (K−PS−QR) of a given block circulant matrix

    [00021] ( BC = ( P Q R S ) )

    is obtained. Since all of P, Q, R, S are circulant matrices, K is also a circulant matrix.

    [0032] First, an inverse matrix (K.sup.−1) of K is obtained, and an inverse matrix (BC.sup.−1) of BC is obtained by calculating

    [00022] ( K - 1 .Math. S - K - 1 .Math. Q - K - 1 .Math. R K - 1 .Math. P ) .

    At this time, efficient algorithms such as the Extended Euclidean Algorithm are used to obtain the inverse matrix of K.

    3. Randomization Using Structured Matrix

    [0033] Embodiments of message randomization or secret key randomization to cope with various types of attacks such as a side-channel attack are as below. [0034] (i) generating a first operation result by adding a matrix and a message (or a secret key), and then, subtracting the matrix from the first operation result, or [0035] (ii) generate a second operation result by multiplying a matrix and a message (or a secret key), and then, multiplying the second operation result by an inverse matrix of the matrix.

    [0036] At this time, if the matrix is selected as a structured matrix, calculation efficiency can be increased.

    3-1. Randomization Using a Circulant Matrix or a Block Circulant Matrix

    [0037] Embodiments of message randomization or secret key randomization to cope with various types of attacks such as a side-channel attack are as below. [0038] (i) generating a first operation result by adding a matrix and a message (or a secret key), and then, subtracting the matrix from the first operation result, or [0039] (ii) generating a second operation result by multiplying a matrix and a message (or a secret key), and then, multiplying the second operation result by an inverse matrix of the matrix.

    [0040] At this time, if a random matrix is selected as a circulant matrix or a block circulant matrix, the calculation efficiency can be increased.

    3-2. When custom-character.sub.q is a finite field with q elements, if a random matrix (R) is selected as a circulant matrix as shown in Equation 10 to randomize a secret key ({tilde over (S)}) in a product ({tilde over (S)}.Math.h) of a vector (h) of custom-character.sub.q.sup.m and the secret key ({tilde over (S)}), the calculation efficiency can be increased.


    {tilde over (S)}(H(M))=({tilde over (S)}+R)(H(M))(−R(H(M))


    or


    {tilde over (S)}(H(M))=({tilde over (S)}.Math.R.sup.−1.Math.R)(H(M))   [Equation 10]

    [0041] Here, {tilde over (S)}=S.sup.−1, and H(M) is a hash value for a message M and is expressed as H(M)=ξ=(ξ.sub.1, . . . , ξ.sub.m)∈custom-character.sub.q.sup.m.

    [0042] The electronic (or digital) signature algorithms based on multivariate quadratic polynomials (or equations) according to the present invention include a key generation algorithm, a signature generation algorithm, and a signature verification algorithm. The electronic signature algorithms based on multivariate quadratic polynomials are executed by an electronic apparatus (or a digital signature apparatus) or a computer program being executed in the electronic apparatus.

    [0043] A computer program stored in a storage medium has a program code for performing a method for electronic signature algorithms based on a structured matrix (algorithms that protect authentication, non-repudiation, and/or integrity of a message (or data)), and the program code is executed in a computing apparatus.

    [0044] The computing apparatus refers to a PC (personal computer), a server, or a mobile device, and the mobile device refers to a mobile phone, a smartphone, an Internet mobile device (MID), a laptop computer, or the like, but the present invention is not limited thereto.

    [0045] FIG. 1 is a block diagram of an electronic signer based on multivariate quadratic polynomials with one layer according to embodiments of the present invention, and FIG. 2 is a flowchart for describing an operation of the electronic signer based on multivariate quadratic polynomials shown in FIG. 1. An electronic signer 100 of FIG. 1 constitutes a secret central map having one layer, executes electronic signature algorithms based on multivariate quadratic polynomials using the secret central map, and includes a key generator 110, a signature generator 120, and a signature verifier 130.

    [0046] In the present specification, the electronic signer 100 or 200 may be implemented as a hardware component or a software component. When the electronic signer 100 or 200 is implemented as a hardware component, each of the components 110, 120, and 130 is implemented as a hardware component, and, when the electronic signer 100 is implemented as a software component, each of the components 110, 120, and 130 is implemented as a software component.

    Key Generation Algorithm

    [0047] The key generator 110 performs steps (S110 to S130) to perform the key generation algorithm for calculating a public key.

    [0048] For a security parameter (λ), a pair (<PK, SK>=<custom-character, (custom-character, {tilde over (T)})>) of a public key (PK) and a secret key (SK) is generated as follows. The security parameter (λ) indicates a security level. [0049] 1. one affine map ({tilde over (T)}) is randomly selected (S110). If the affine map ({tilde over (T)}) is not invertible, a new affine map will be randomly selected again. Here, T:custom-character.sub.q.sup.n.fwdarw.custom-character.sub.q.sup.n and, {tilde over (T)}=T.sup.−1. It is assumed that affine maps and a secret central map (custom-character=custom-charactertext missing or illegible when filed, . . . , custom-character.sup.(m)) are securely stored in an apparatus (for example, a data storage apparatus) which can be accessed by the key generator 110. [0050] 2. The secret central map (custom-character=custom-charactertext missing or illegible when filed, . . . , custom-character.sup.(m)) is selected as below (S120).

    [0051] For application to electronic signature algorithms based on multivariate quadratic polynomials using a structured matrix, a configuration of a new central map according to the present invention requires two index sets (V, O) when there is one (1) layer. custom-character:custom-charactertext missing or illegible when filed.sup.n.fwdarw.custom-character.sub.q.sup.m, and each of n and m is a natural number.


    V={1, . . . , υ}


    O={υ+1, . . . , υ+o}

    [0052] Here, |V|=υ, and |O|=o. V is an index set for defining Vinegar variables, and O is an index set for defining Oil variables.

    [0053] In the secret central map (custom-character=custom-charactertext missing or illegible when filed, . . . , custom-character.sup.(m)), that is, a system of multivariate quadratic polynomials having m=o equations and n=υ+m variables, custom-character.sup.(i) for i=1, . . . , o will be defined as shown in Equation 11.

    [00023] .Math. [ Equation .Math. .Math. 11 ] { ( 1 ) ( x 1 , .Math. , x v + o ) = V ( 1 ) ( x i , .Math. , x v ) + OV ( 1 ) ( x 1 , .Math. , x v + o ) + δ 1 .Math. ( o ) ( x 1 , .Math. , x v + o ) = V ( o ) ( x i , .Math. , x v ) + OV ( o ) ( x 1 , .Math. , x v + o ) + δ o

    [0054] custom-character.sub.V.sup.(i) for i=1, . . . , o will be defined as shown in Equation 12,

    [00024] ( OV ( 1 ) OV ( 2 ) .Math. F OV ( o ) ) = ( x 1 x 2 .Math. x v x ? x 1 .Math. x v - 1 .Math. .Math. .Math. x ? + 2 x ? + 3 .Math. x ? .Math. 1 ) .Math. ( L 1 L 2 .Math. L ? ) + M v .Math. ( L 1 L 2 .Math. L ? ) .Math. .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 12 ]

    [0055] Here, M.sub.v is a circulant matrix or a submatrix of a circulant matrix.

    [0056] custom-character.sub.OV.sup.(i) for i=1, . . . , o will be defined as shown in Equation 13, and

    [00025] ( OV ( 1 ) OV ( 2 ) .Math. F OV ( o ) ) = ( v T .Math. a 11 v T .Math. a 12 .Math. v T .Math. a 1 .Math. o v T .Math. a 21 v T .Math. a 22 .Math. v T .Math. a 2 .Math. o .Math. .Math. .Math. v T .Math. a o .Math. 1 v T .Math. a o .Math. 2 .Math. v T .Math. a o .Math. o ) .Math. ( x v + 1 x v + 2 .Math. x v + o ) + B ( x v + 1 x v + 2 .Math. x v + o ) = ( v T 0 .Math. 0 0 v T .Math. 0 .Math. .Math. .Math. 0 0 .Math. v T ) .Math. ( a 11 a 12 .Math. a 1 .Math. o a 21 a 22 .Math. a 2 .Math. o .Math. .Math. .Math. a o .Math. 1 a o .Math. 2 .Math. a oo ) .Math. ( x v + 1 x v + 2 .Math. x v + o ) + B ( x v + 1 x v + 2 .Math. x v + o ) [ Equation .Math. .Math. 13 ]

    [0057] Here, B is the same as B in Equation 9, and M.sub.OV is the same as M.sub.OV in Equation 8.

    [00026] B = ( b 11 b 12 .Math. b 1 .Math. o b 21 b 22 .Math. b 2 .Math. o .Math. .Math. .Math. b o .Math. 1 b o .Math. 2 .Math. b oo ) , M OV = ( a 11 a 12 .Math. a 1 .Math. o a 21 a 22 .Math. a 2 .Math. o .Math. .Math. .Math. a o .Math. 1 a o .Math. 2 .Math. a ? ) , M OV = ( a 11 a 12 .Math. a 1 .Math. o a 21 a 22 .Math. a 2 .Math. o .Math. .Math. .Math. a o .Math. 1 a o .Math. 2 .Math. a ? ) = ( p 1 p 2 .Math. p k q 1 q 2 .Math. q k p k p 1 .Math. p k - 1 q k q 1 .Math. q k - 1 .Math. .Math. .Math. .Math. .Math. .Math. p 2 p 3 .Math. p 1 q 2 q 3 .Math. q 1 r 1 r 2 .Math. r k s 1 s 2 .Math. s k r k r 1 .Math. r k - 1 s k s 1 .Math. s k - 1 .Math. .Math. .Math. .Math. .Math. .Math. r 2 r 3 .Math. r 1 s 2 s 3 .Math. s 1 ) = ( P Q R S ) B = ( b 11 b 12 .Math. b ? b 21 b 22 .Math. b ? .Math. .Math. .Math. b o .Math. 1 b o .Math. 2 .Math. b oo ) = ( t 1 t 2 .Math. t k u 1 u 2 .Math. u k t k t 1 .Math. t k - 1 u k u 1 .Math. u k - 1 .Math. .Math. .Math. .Math. .Math. .Math. t 2 t 3 .Math. t 1 u 2 u 3 .Math. u 1 v 1 v 2 .Math. v k w 1 w 2 .Math. w k v k v 1 .Math. v k - 1 w k w 1 .Math. w k - 1 .Math. .Math. .Math. .Math. .Math. .Math. v 2 v 3 .Math. v 1 w 2 w 3 .Math. w 1 ) ? .Math. indicates text missing or illegible when filed

    [0058] A constant term (δ.sub.i) is randomly selected in the finite field (custom-character.sub.q). [0059] 3. A public key (custom-character=custom-character∘T) is calculated (S130). Here, a circle means a composition, the public key (custom-character=custom-character∘T) is required for signature verification, and a secret key (SK=(custom-character, {tilde over (T)}) is required for signature generation.

    Signature Generation Algorithm

    [0060] A signature generator 120 performs steps (S140 to S160) to perform the signature generation algorithm, that is, how to invert a new central map according to the present invention.

    [0061] The signature generator 120 receives an affine map {tilde over (T)}, a secret central map custom-character, and a message M. The message M refers to a message to be transmitted via a communication medium (for example, wired or wireless) as plain text. [0062] 1. A hash message (H(M)=ξ) for the message M is calculated (S140). Here,
    H:{0, 1}*.fwdarw.custom-character.sub.q.sup.m is a collision resistant hash function.
    H(M)=ξ=(ξ.sub.1, . . . , ξ.sub.m)∈custom-character.sub.q.sup.m is calculated. [0063] 2. When ο=(ξ.sub.1, . . . , ξ.sub.m) is given, processes of finding custom-character.sup.−1(ξ)=s, that is, a solution s=(s.sub.1, . . . , s.sub.n) of custom-character(x)=ξ are as below (S150).

    [0064] A vector of random values s.sub.v=(s.sub.1, . . . , s.sub.υ)∈custom-character.sub.q.sup.υ is selected. The vector (s.sub.v) is plugged into custom-character.sub.V.sup.(i) for i=1, . . . , m to calculate a product of a o×υ submatrix of a υ×υ circulant matrix and a transpose of a vector ((L.sub.1(s.sub.υ), . . . , L.sub.υ(s.sub.υ))), and, as a result, (c.sub.1, . . . , c.sub.o) is obtained. At this time, the o×υ submatrix is M.sub.V in Equation 3.

    [0065] If the vector (s.sub.v) is plugged into custom-character.sub.OV.sup.(i) for i=1, . . . , m to obtain a system of O linear equations having O variables (χ.sub.υ+1, . . . , χ.sub.n), a form of the coefficient matrix is a block circulant matrix (BC).

    [0066] Here, the block circulant matrix (BC) is a matrix obtained by multiplying a matrix that is obtained by plugging the vector (s.sub.v) into a matrix composed of v.sup.T in Equation 13 by M.sub.OV.

    [0067] A solution (s.sub.υ+1, . . . , s.sub.n), is obtained by multiplying the inverse matrix (BC.sup.−1) obtained by the method defined in 2-2 described above by a transpose of (ξ.sub.1−c.sub.1−δ.sub.1, . . . , ξ.sub.o−c.sub.o−δ.sub.o). Accordingly, a vector s=(s.sub.1, . . . , s.sub.n) is a solution of custom-character(x)=ξ.

    [0068] If there is no inverse matrix BC.sup.−1 of the block circulant matrix BC, the procedure returns to a beginning of the signature generation algorithm to select a vector of new random values s.sub.v′=(s′.sub.1, . . . , s′.sub.υ) and performs the methods (or processes) described above again. [0069] 3. {tilde over (T)}(s)=σ is calculated (S160). σ refers to a signature of the message M (here, the signature means a digital signature or an electronic signature).

    Signature Verification or Verification Algorithm

    [0070] The signature verifier 130 performs a step (S170) to perform a signature verification or verification algorithm. If the signature verifier 130 receives one of the public key custom-character and a certificate including the public key custom-character, the message M, and the signature σ from the signature generator 120, that is, if the public key custom-character and the signature σ for the message M are given, the signature verifier 130 checks whether P(σ)=H(M). If P(σ)=H(M), the signature σ is accepted, and otherwise, the signature σ is rejected.

    [0071] FIG. 3 is a block diagram of an electronic signer based on multivariate quadratic polynomials with two layers according to embodiments of the present invention. FIG. 4 is a flowchart for describing an operation of the electronic signer based on multivariate quadratic polynomials shown in FIG. 3. The electronic signer 200 of FIG. 3 constitutes and processes a secret central map with two layers.

    [0072] The key generator 210 performs step (S210) to perform the key generation algorithm for calculating a secret key and a public key.

    Key Generation Algorithm:

    [0073] For the security parameter (λ), a pair (<PK, SK>=<custom-character, ({tilde over (S)}, custom-character, {tilde over (T)})>) of a public key (PK) and a secret (SK) is generated as follows. The security parameter (λ) represents a security level. [0074] 1. Two affine maps {tilde over (S)} and {tilde over (T)} are randomly selected (S210). If {tilde over (S)} and {tilde over (T)} are not invertible, two (new) affine maps {tilde over (S)} and {tilde over (T)} are randomly selected again. Here, S:custom-character.sub.q.sup.m.fwdarw.custom-character.sub.q.sup.m and {tilde over (S)}=S.sup.−1, and T:custom-character.sub.q.sup.n.fwdarw.custom-character.sub.q.sup.n and, {tilde over (T)}=T.sup.−1. Affine maps including the affine maps {tilde over (S)} and {tilde over (T)} and the secret central map (custom-character=custom-charactertext missing or illegible when filed, . . . , custom-character.sup.(m) can be securely stored in an apparatus which can be accessed by the key generator 210. [0075] 2. The secret central map custom-character=custom-charactertext missing or illegible when filed, . . . , custom-character.sup.(m) is selected as below (S220).

    [0076] For application to electronic signature algorithms based on multivariate quadratic polynomials using a structured matrix, a configuration of a new central map according to the present invention requires two index sets (V, O.sub.1, and O.sub.2) when there are two layers.


    V={1, . . . , υ},


    O.sub.1={υ+1, . . . , υ+o.sub.1},


    O.sub.2={υ+o.sub.1+1, . . . , υ+o.sub.1+o.sub.2}

    [0077] Here, |V|=υ, and |O.sub.i|=o.sub.i for i=1, 2. V is an index set for defining Vinegar variables, and O.sub.1 and O.sub.2 are index sets for defining Oil variables.

    [0078] In the secret central map custom-character=custom-charactertext missing or illegible when filed, . . . , custom-character.sup.(m), that is, a system of quadratic polynomials having m=o.sub.1+o.sub.2 (here, each of O.sub.1 and O.sub.2 and is a natural number) polynomials and n=υ+m variables, custom-character.sup.(i) for i=1, . . . , o.sub.1 will be defined as shown in Equation 14.

    [00027] { ( 1 ) ( x 1 , .Math. , x v + o ) = v ( 1 ) ( x i , .Math. , x v ) + OV ( 1 ) ( x 1 , .Math. , x v + o 1 ) + δ 1 , .Math. ( o 1 ) ( x 1 , .Math. , x v + o 1 ) = v ( o 1 ) ( x i , .Math. , x v ) + OV ( o 1 ) ( x 1 , .Math. , x v + o 1 ) + δ o 1 [ Equation .Math. .Math. 14 ]

    [0079] Here, custom-character.sub.V.sup.(i) is defined as shown in Equation 2 and custom-character.sub.OV.sup.(i) is defined as shown in Equation 4. At this time, when O is replaced with O.sub.1 (o.sub.1=2k, here, k.sub.1 is a natural number) as in 1-2 described above, Equation 3 becomes Equation 15, Equation 6 becomes Equation 16, and Equations 8 and 9 become Equation 17.

    [00028] ( V ( 1 ) V ( 2 ) .Math. F V ( o 1 ) ) = ( x 1 x 2 .Math. x v x x 1 .Math. x v - 1 .Math. .Math. .Math. .Math. x - o 1 + 2 x - o 1 + 3 .Math. x - o 1 + 1 ) .Math. ( L 1 L 2 .Math. L ) + M v 1 .Math. ( L 1 L 2 .Math. L ) [ Equation .Math. .Math. 15 ]

    [0080] Here, M.sub.V.sup.1 is a circulant matrix or a submatrix of a circulant matrix, and custom-character.sub.OV.sup.(i) for i=1, . . . , o.sub.1 is as shown in Equation 16.

    [00029] ( OV ( 1 ) OV ( 2 ) .Math. F OV ( o 1 ) ) = ( v T .Math. a 11 v T .Math. a 12 .Math. v T .Math. a 1 .Math. o 1 v T .Math. a 21 v T .Math. a 22 .Math. v T .Math. a 2 .Math. o 1 .Math. .Math. .Math. v T .Math. a o 1 .Math. 1 v T .Math. a o 1 .Math. 2 .Math. v T .Math. a o 1 .Math. o 1 ) .Math. ( x v + 1 x v + 2 .Math. x v + o 1 ) + B 1 ( x v + 1 x v + 2 .Math. x v + o 1 ) = ( v T 0 .Math. 0 0 v T .Math. 0 .Math. .Math. .Math. 0 0 .Math. v T ) .Math. ( a 11 a 12 .Math. a 1 .Math. o 1 a 21 a 22 .Math. a 2 .Math. o 1 .Math. .Math. .Math. a o .Math. 1 a o .Math. 2 .Math. a o 1 .Math. o 1 ) .Math. ( x v + 1 x v + 2 .Math. x v + o 1 ) + B 1 ( x v + 1 x v + 2 .Math. x v + o 1 ) [ Equation .Math. .Math. 16 ]

    Here,

    [0081]
    v.sup.T=[χ.sub.1χ.sub.2 . . . χ.sub.υ],

    [00030] M OV , 1 = ( a 11 a 12 .Math. a a 21 a 22 .Math. a .Math. .Math. .Math. a o 1 .Math. 1 a o 1 .Math. 2 .Math. a ) , and B 1 = ( b 11 b 12 .Math. b b 21 b 22 .Math. b .Math. .Math. .Math. b o 1 .Math. 1 b o 1 .Math. 2 .Math. b ) .

    [0082] Here, M.sub.OV,1 is a block circulant matrix whose elements are column vectors a.sub.ij each having a size υ, and B.sub.1 is a block circulant matrix.

    [0083] The block circulant matrix M.sub.OV,1 of the vectors and the block circulant matrix B.sub.1 are as shown in Equation 17.

    [00031] M OV 1 = ( a 11 a 12 .Math. a 1 .Math. o 1 a 21 a 22 .Math. a 2 .Math. o 1 .Math. .Math. .Math. a o 1 .Math. 1 a o 1 .Math. 2 .Math. a ) = ( p 1 p 2 .Math. p k q 1 q 2 .Math. q k 1 p k 1 p 1 .Math. p k 1 - 1 q k 1 q 1 .Math. q k 1 - 1 .Math. .Math. .Math. .Math. .Math. .Math. p 2 p 3 .Math. p 1 q 2 q 3 .Math. q 1 r 1 r 2 .Math. r k 1 s 1 s 2 .Math. s k 1 r k 1 r 1 .Math. r k 1 - 1 s k 1 s 1 .Math. s k 1 - 1 .Math. .Math. .Math. .Math. .Math. .Math. r 2 r 3 .Math. r 1 s 2 s 3 .Math. s 1 ) = ( P 1 Q 1 R 1 S 1 ) .Math. .Math. B 1 = ( b 11 b 12 .Math. b b 21 b 22 .Math. b ( ) 1 .Math. .Math. .Math. b o 1 .Math. 1 b o 1 .Math. 2 .Math. b o 1 .Math. o 1 ) = ( t 1 t 2 .Math. t k 1 u 1 u 2 .Math. u k 1 t k 1 t 1 .Math. t k 1 - 1 u k 1 u 1 .Math. u k 1 - 1 .Math. .Math. .Math. .Math. .Math. .Math. t 2 t 3 .Math. t 1 u 2 u 3 .Math. u 1 v 1 v 2 .Math. v k 1 w 1 w 2 .Math. w k 1 v k 1 v 1 .Math. v k 1 - 1 w k 1 w 1 .Math. w k 1 - 1 .Math. .Math. .Math. .Math. .Math. .Math. v 2 v 3 .Math. v 1 w 2 w 3 .Math. w 1 ) [ Equation .Math. .Math. 17 ]

    [0084] Here, P.sub.1, Q.sub.1, R.sub.1, S.sub.1 are circulant matrices of vectors, and M.sub.OV,1 is a block circulant matrix of vectors.

    [0085] At last, a constant term δ.sub.i is randomly selected in the finite field custom-character.sub.q. custom-character.sup.(i) for i=o.sub.1+1, . . . , m will be defined as shown in Equation 18.

    [00032] .Math. [ Equation .Math. .Math. 18 ] { ( o i + 1 ) ( x 1 , .Math. , x n ) = V ( o i + 1 ) ( x i , .Math. , x v + o 1 ) + OV ( o i + 1 ) ( x 1 , .Math. , x n ) + δ 01 + 1 , .Math. ( m ) ( x 1 , .Math. , x n ) = V ( o i + o 2 ) ( x i , .Math. , x v + o 1 ) + OV ( m ) ( x 1 , .Math. , x n ) + δ m ,

    [0086] Here, custom-character.sub.V.sup.(i) is defined as shown in Equation 2. At this time, if L.sub.i of 1-1 described above is replaced with L′.sub.i and υ is replaced with υ+o.sub.1, custom-character.sub.V.sup.(i) is as shown in Equation 19.

    [00033] .Math. V ? = x 1 .Math. L 1 + α 2 .Math. L 2 + .Math. + x ? .Math. L v + 01 , .Math. .Math. V ? = x ? .Math. L 1 + ? 1 .Math. L 2 + .Math. + x v + o 1 - 1 .Math. L ? + 01 , .Math. .Math. .Math. , .Math. V ? = x v + ? + 2 .Math. L 1 + x ? + o 1 - o 2 + 3 .Math. L 2 + .Math. + x v + o 1 - o 2 + 1 .Math. L v + 01 , .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 19 ]

    [0087] custom-character.sub.OV.sup.(i) is defined as shown in Equation 4. At this time, if υ described in 1-2 is replaced with υ+o.sub.1 and O is replaced with O.sub.2 (o.sub.2=2k.sub.2, here, k.sub.2 is a natural number), Equation 3 becomes Equation 20, Equation 6 becomes Equation 21, and Equations 8 and 9 become Equation 22.

    [00034] [ Equation .Math. .Math. 20 ] .Math. ( ? ? .Math. ? ) = ( x 1 x 2 .Math. ? ? x 1 .Math. ? .Math. .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( L 1 L 2 .Math. ? ) = M V 2 .Math. ( L 1 L 2 .Math. ? ) .Math. .Math. ? .Math. indicates text missing or illegible when filed

    [0088] Here, M.sub.V.sup.2 is a circulant matrix or a submatrix of a circulant matrix, and custom-character.sub.OV.sup.(i) for i=o.sub.1+1, . . . , o.sub.1+o.sub.2 will be defined as shown in Equation 21.

    [00035] ( OV ( o 1 + 1 ) OV ( o 1 + 2 ) .Math. OV ( o 1 + o 2 ) ) = ( v .Math. .Math. T .Math. a 11 v .Math. .Math. T .Math. a 12 .Math. ? v .Math. .Math. T .Math. a 21 v .Math. .Math. T .Math. a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) .Math. ( ? ? .Math. ? ) + B 2 ( ? ? .Math. ? ) = ( v .Math. .Math. T 0 .Math. 0 0 v .Math. .Math. T .Math. 0 .Math. .Math. .Math. 0 0 .Math. v .Math. .Math. T ) .Math. ( a 11 a 12 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? a 11 .Math. ? ) .Math. ( ? ? .Math. ? ) + B 2 ( ? ? .Math. ? ) .Math. .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 21 ]

    Here,

    [0089] [00036] .Math. v .Math. .Math. T = [ x 1 x 2 .Math. ? ] , .Math. .Math. .Math. M OV , 2 = ( a 11 a 21 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) , .Math. and .Math. .Math. B 2 = ( b 11 b 21 .Math. ? b 21 b 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) . .Math. ? .Math. indicates text missing or illegible when filed

    [0090] Here, M.sub.OV,2 is a block circulant matrix whose elements are column vectors a′.sub.ij each having a size υ, and B.sub.2 is a block circulant matrix.

    [0091] The block circulant matrix M.sub.OV,2 of vectors and the block circulant matrix B.sub.2 are as shown in Equation 22.

    [00037] M OV , 2 = ( a 11 a 21 .Math. ? a 21 a 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) = ( p 1 p 2 .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ) = ( P 2 Q 2 R 2 S 2 ) .Math. .Math. B 2 = ( b 11 b 21 .Math. ? b 21 b 22 .Math. ? .Math. .Math. .Math. ? ? .Math. ? ) = ( t 1 t 2 .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? ? ? .Math. ? .Math. .Math. .Math. .Math. .Math. .Math. ? ? .Math. ? ? ? .Math. ? ) .Math. .Math. ? .Math. indicates text missing or illegible when filed [ Equation .Math. .Math. 22 ]

    [0092] Here, p′.sub.i, q′.sub.i, s′.sub.i, r′.sub.i are column vectors each having the size υ, each of P.sub.2, Q.sub.2, R.sub.2, S.sub.2 is a circulant matrix of vectors, and M.sub.OV,2 is a block circulant matrix of vectors.

    [0093] At last, a constant term δ.sub.i is randomly selected in the finite field custom-character.sub.q. [0094] 3. A public key custom-character=S∘custom-character∘T is calculated (S230).

    Signature Generation Algorithm

    [0095] The signature generator 220 performs steps (S240 to S260) to perform the signature generation algorithm, that is, how to invert a new central map according to the present invention. The signature generator 220 receives the affine maps {tilde over (S)} and {tilde over (T)}, the secret central map custom-character, and the message M. [0096] 1. A hash message H(M) for the message M is calculated (S240).

    [0097] Here, H:{0, 1}*.fwdarw.custom-character.sub.q.sup.m is a collision resistant hash function. [0098] 2. {tilde over (S)}(H(M))=ξ=(ξ.sub.1, . . . , ξ.sub.m)∈custom-character.sub.q.sup.m is calculated (S240). If a random matrix R, that is, a circulant matrix, is given (or provided), as described in 3-2, {tilde over (S)}(H(M)) is calculated according to Equation 10. [0099] 3. When ξ=(ξ.sub.1, . . . , ξ.sub.m) is given, processes of finding custom-character.sup.−1(ξ)=s, that is, solutions s=(s.sub.1, . . . , s.sub.n) of custom-character(x)=ξ, are as below (S250).

    [0100] In a first layer,

    [0101] a random vector s.sub.V=(s.sub.1, . . . , s.sub.υ)∈custom-character.sub.q.sup.υ is randomly selected.

    [0102] The vector (s.sub.v) is plugged into the first layer custom-character.sub.V.sup.(i) for i=1, . . . , o.sub.1 to calculate a product of a o.sub.1×υ submatrix of a υ×υ circulant matrix and the transpose of a vector (L.sub.1(s.sub.υ), . . . , L.sub.υ(s.sub.υ)), and, as a result, (c.sub.1, . . . , c.sub.o.sub.1) is obtained. At this time, the o.sub.1×υ submatrix into which the vector s.sub.v is plugged is M.sub.V.sup.1.

    [0103] The vector s.sub.v is plugged into custom-character.sub.OV.sup.(i) for i=1, . . . , o.sub.1 to obtain a system of linear equations of O.sub.1 equations having O.sub.1 variables. At this time, a coefficient matrix of the system of linear equations is a block circulant matrix BC.sub.1.

    [0104] Here, the block circulant matrix BC.sub.1 is a matrix obtained by multiplying a matrix that is obtained by plugging the vector s.sub.v into a matrix composed of v.sup.T in Equation 13 by M.sub.OV,1.

    [0105] A solution s.sub.υ+1, . . . , s.sub.υ+o.sub.1 is obtained by multiplying the transpose of (ξ.sub.1−c.sub.1−δ.sub.1, . . . , ξ.sub.o.sub.1−c.sub.o.sub.1−δ.sub.o.sub.1) by the inverse matrix BC.sub.1.sup.−1 obtained by the method defined in 2-2 described above.

    [0106] In a second layer,

    [0107] a vector s.sub.υ+o.sub.1=(s.sub.1, . . . , s.sub.υ+o.sub.1) is plugged into the second layer custom-character.sub.V.sup.(i) for i=o.sub.1+1, . . . , m to calculate a product of a o.sub.2×(υ+o.sub.1) submatrix of a (υ+o.sub.1)×(υ+o.sub.1) circulant matrix and a transpose of a vector (L′.sub.1(s.sub.υ+o.sub.1), . . . , L′.sub.υ+o.sub.1(s.sub.υ+o.sub.1)), and, as a result (c.sub.o.sub.1.sub.1, . . . , c.sub.m), is obtained.

    [0108] At this time, the o.sub.2×(υ+o.sub.1) submatrix into which the vector (s.sub.υ+o.sub.1) is plugged is M.sub.V.sup.2.

    [0109] The vector (s.sub.υ+o.sub.1) is plugged into custom-character.sub.OV.sup.(i) for i=o.sub.1+1, . . . , m to obtain a system of linear equations of o.sub.2 equations having o.sub.2 variables. At this time, a coefficient matrix of the system of linear equations is a block circulant matrix BC.sub.2.

    [0110] Here, the block circulant matrix BC.sub.2 is a matrix obtained by multiplying a matrix that is obtained by plugging the vector S.sub.υ+o.sub.1 into a matrix composed of v.sup.T in Equation 21 by M.sub.OV,2.

    [0111] A solution (s.sub.υ+o.sub.1.sub.+1, . . . , s.sub.υ+m) is obtained by multiplying the transpose of (ξ.sub.o.sub.1.sub.+1−c.sub.o.sub.1.sub.+1−δ.sub.o.sub.1.sub.+1, . . . , ξ.sub.m−c.sub.m−δ.sub.m) by the inverse matrix BC.sub.2.sup.−1 obtained by the method defined in 2-2 described above. Then, a vector s=(s.sub.1, . . . , s.sub.n) is a solution of custom-character(x)=ξ.

    [0112] If there is no inverse matrix BC.sub.1.sup.−1 of the block circulant matrix BC.sub.1 or there is no inverse matrix BC.sub.2.sup.−1 of the block circulant matrix BC.sub.2, the procedure returns to a beginning of the electronic signature algorithm to select a vector s.sub.v′=(s′.sub.1, . . . , s′.sub.υ) of new random values, and performs the methods (or processes) described above again. [0113] 4. {tilde over (T)}(s)=σ is calculated (S260). σ refers to a signature of the message M (here, the signature is a digital signature or an electronic signature).

    Signature Verification or Verification Step:

    [0114] If the signature verifier 230 receives the message M, the signature σ, and the public key custom-character, that is, if the public key custom-character and the signature σ for the message M are given, the signature verifier 230 checks whether P(σ)=H(M) (S270). If P(σ)=H(M), the signature σ is accepted, and otherwise, the signature σ is rejected.

    [0115] A method, an apparatus (or a device), or a computer program for performing an electronic signature algorithm based on multivariate quadratic polynomials according to the embodiment of the present invention can greatly reduce a length of a secret key by using structured matrices, and generate signatures quickly by increasing calculation efficiency.

    [0116] Although the present invention has been described with reference to the embodiment shown in the drawings, this is merely exemplary, and it will be understood by those skilled in the art that various modifications and equivalent other embodiments thereof can be made. Therefore, a true technical protection scope of the present invention will be defined by a technical spirit of the appended claims.