Paper 2025/595

Partial Key Exposure Attacks on UOV and Its Variants

Yuki Seto, The University of Tokyo
Hiroki Furue, NTT Social Informatics Laboratories
Atsushi Takayasu, The University of Tokyo, National Institute of Advanced Industrial Science and Technology
Abstract

In CRYPTO 2022, Esser et al. proposed a partial key exposure attack on several post-quantum cryptographic schemes including Rainbow which is a variant of UOV. The task of the attack is to recover a full secret key from its partial information such as a secret key with symmetric/asymmetric bit errors. One of the techniques Esser et al. developed is a partial enumeration that combines the standard algorithms to solve the MQ problem with enumeration. Although an efficient attack on Rainbow was proposed, UOV and its variants have still been paid much attention since UOV and its three variants, i.e., MAYO, QR-UOV and SNOVA, were selected as the Round 2 candidates of the additional call for digital signature schemes proposal by NIST. In this paper, we analyze partial key exposure attacks on UOV, MAYO, and QR-UOV. Although our proposed attacks use the partial enumeration, we refine their enumeration strategy. We employ two enumeration strategies and analyze the complexity of the proposed attacks. Then, we find a structural difference between UOV and its variants to resist partial enumeration. Specifically, the partial enumeration is effective if the number of vinegar variables is smaller than the number of equations and the order of a finite field is small. As a result, the proposed attack is the most effective on MAYO. While our attacks on UOV and QR-UOV are effective only when the symmetric error probabilities are 0.11 and 0.05, respectively, that on MAYO is effective even when the probability is close to 0.5.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. ACISP 2025
Keywords
post-quantum cryptographymultivariate cryptographyUOVpartial key exposure attack
Contact author(s)
sitoo @ g ecc u-tokyo ac jp
hiroki furue @ ntt com
takayasu-a @ g ecc u-tokyo ac jp
History
2025-04-04: approved
2025-04-02: received
See all versions
Short URL
https://ia.cr/2025/595
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/595,
      author = {Yuki Seto and Hiroki Furue and Atsushi Takayasu},
      title = {Partial Key Exposure Attacks on {UOV} and Its Variants},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/595},
      year = {2025},
      url = {https://eprint.iacr.org/2025/595}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.