You are looking at a specific version 20040103:131213 of this paper. See the latest version.

Paper 2003/160

A More Secure and Efficacious TTS Signature Scheme

Jiun-Ming Chen and Bo-Yin Yang

Abstract

In 2002 the new genre of digital signature scheme TTS (Tame Transformation Signatures) is introduced along with a sample scheme TTS/2. TTS is from the family of multivariate cryptographic schemes to which the NESSIE primitive {SFLASH} also belongs. It is a realization of Moh's theory for digital signatures, based on Tame Transformations or Tame Maps. Properties of multivariate cryptosystems are determined mainly by their central maps. TTS uses Tame Maps as their central portion for even greater speed than $C^\ast$-related schemes (using monomials in a large field for the central portion), previously usually acknowledged as fastest. We show a small flaw in TTS/2 and present an improved TTS implementation which we call TTS/4. We will examine in some detail how well TTS/4 performs, how it stands up to previously known attacks, and why it represents an advance over TTS/2. Based on this topical assessment, we consider TTS in general and TTS/4 in particular to be competitive or superior in several aspects to other schemes, partly because the theoretical roots of TTS induce many good traits. One specific area in which TTS/4 should excel is in low-cost smartcards. It seems that the genre has great potential for practical deployment and deserves further attention by the cryptological community.

Note: This is a more complete version of the paper that was presented to ICISC for the proceedings (due to appear in LNCS)

Metadata
Available format(s)
PDF PS
Category
Public-key cryptography
Publication info
Published elsewhere. Condensed version presented at ICISC'03, in proceedings
Keywords
Finite FieldTame TransformationDigital SignatureTTMTTS
Contact author(s)
by @ moscito org
History
2004-01-03: last of 19 revisions
2003-08-07: received
See all versions
Short URL
https://ia.cr/2003/160
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.