{"id":"https://openalex.org/W2134116123","doi":"https://doi.org/10.1145/2484389.2484401","title":"A variant of rainbow with shorter secret key and faster signature generation","display_name":"A variant of rainbow with shorter secret key and faster signature generation","publication_year":2013,"publication_date":"2013-05-08","ids":{"openalex":"https://openalex.org/W2134116123","doi":"https://doi.org/10.1145/2484389.2484401","mag":"2134116123"},"language":"en","primary_location":{"id":"doi:10.1145/2484389.2484401","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2484389.2484401","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the first ACM workshop on Asia public-key cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071900222","display_name":"Takanori Yasuda","orcid":"https://orcid.org/0000-0002-2536-7429"},"institutions":[{"id":"https://openalex.org/I4210148705","display_name":"Institute of Systems, Information Technologies and Nanotechnologies","ror":"https://ror.org/04j4pme17","country_code":"JP","type":"facility","lineage":["https://openalex.org/I4210148705"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Takanori Yasuda","raw_affiliation_strings":["Institute of Systems, Information Technologies and Nanotechnologies, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Systems, Information Technologies and Nanotechnologies, Fukuoka, Japan","institution_ids":["https://openalex.org/I4210148705"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055357255","display_name":"J\u00edntai Ding","orcid":"https://orcid.org/0000-0003-1257-7598"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jintai Ding","raw_affiliation_strings":["Chongqing University, Chongqing, China","ChongQing University, ChongQing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"ChongQing University, ChongQing, China#TAB#","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000004915","display_name":"Tsuyoshi Takagi","orcid":null},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tsuyoshi Takagi","raw_affiliation_strings":["Kyushu University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu University, Fukuoka, Japan","institution_ids":["https://openalex.org/I135598925"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001126368","display_name":"Kouichi Sakurai","orcid":"https://orcid.org/0000-0003-4621-1674"},"institutions":[{"id":"https://openalex.org/I4210148705","display_name":"Institute of Systems, Information Technologies and Nanotechnologies","ror":"https://ror.org/04j4pme17","country_code":"JP","type":"facility","lineage":["https://openalex.org/I4210148705"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kouichi Sakurai","raw_affiliation_strings":["Institute of Systems, Information Technologies and Nanotechnologies, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Systems, Information Technologies and Nanotechnologies, Fukuoka, Japan","institution_ids":["https://openalex.org/I4210148705"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071900222"],"corresponding_institution_ids":["https://openalex.org/I4210148705"],"apc_list":null,"apc_paid":null,"fwci":0.7251,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74532479,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6527845859527588},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6285670399665833},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6212543845176697},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.598002016544342},{"id":"https://openalex.org/keywords/rainbow","display_name":"Rainbow","score":0.5510544776916504},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5259590148925781},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5137325525283813},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5017409324645996},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4478074014186859},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4425419270992279},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4319009780883789},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3282814621925354},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28067106008529663},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2700760066509247},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.26095739006996155},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24934262037277222},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.09913352131843567}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6527845859527588},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6285670399665833},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6212543845176697},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.598002016544342},{"id":"https://openalex.org/C2776558979","wikidata":"https://www.wikidata.org/wiki/Q1052","display_name":"Rainbow","level":2,"score":0.5510544776916504},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5259590148925781},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5137325525283813},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5017409324645996},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4478074014186859},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4425419270992279},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4319009780883789},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3282814621925354},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28067106008529663},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2700760066509247},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.26095739006996155},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24934262037277222},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.09913352131843567},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2484389.2484401","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2484389.2484401","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the first ACM workshop on Asia public-key cryptography","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W72153092","https://openalex.org/W185678113","https://openalex.org/W1507567045","https://openalex.org/W1513904472","https://openalex.org/W1536729852","https://openalex.org/W1541973237","https://openalex.org/W1573563287","https://openalex.org/W1598238634","https://openalex.org/W1618496890","https://openalex.org/W1628272610","https://openalex.org/W1906691896","https://openalex.org/W1976677460","https://openalex.org/W2128687423","https://openalex.org/W2129993508","https://openalex.org/W2150548144","https://openalex.org/W2151199568","https://openalex.org/W2891430605","https://openalex.org/W3029302826","https://openalex.org/W4297991408","https://openalex.org/W6636614120"],"related_works":["https://openalex.org/W2414747139","https://openalex.org/W2350215162","https://openalex.org/W2077900604","https://openalex.org/W2382634619","https://openalex.org/W1802397081","https://openalex.org/W3082967883","https://openalex.org/W254439514","https://openalex.org/W2017125388","https://openalex.org/W328824506","https://openalex.org/W2100244348"],"abstract_inverted_index":{"Multivariate":[0],"public":[1,24],"key":[2,25,35,61,132],"cryptosystems":[3],"are":[4],"being":[5],"focused":[6],"on":[7],"as":[8,119],"candidates":[9],"for":[10],"post-quantum":[11],"cryptography.":[12],"Rainbow":[13,31,55,80],"is":[14,32,37,113,141,163],"one":[15],"of":[16,30,42,54,79,91,134,148,156],"the":[17,68,92,130,149,160],"most":[18],"efficient":[19,52],"signature":[20,167],"schemes":[21],"in":[22,159],"multivariate":[23],"cryptosystems.":[26],"The":[27,89],"main":[28],"drawback":[29],"that":[33,41,56,109,129,147],"their":[34],"size":[36,90,133],"much":[38],"larger":[39],"than":[40,67,146],"RSA":[43],"and":[44,99,124],"ECC.":[45],"In":[46,72,152],"this":[47,100],"paper,":[48],"we":[49,75],"propose":[50],"an":[51,154],"variant":[53],"has":[57],"a":[58],"shorter":[59],"secret":[60,131],"(and":[62],"thus":[63],"generates":[64],"signatures":[65],"faster)":[66],"corresponding":[69],"original":[70,150],"Rainbow.":[71,151],"our":[73,110,135,157],"scheme,":[74],"divide":[76],"each":[77],"layer":[78],"into":[81],"smaller":[82,93,142],"blocks":[83,94],"by":[84,143,169],"using":[85],"diagonal":[86],"matrix":[87],"representations.":[88],"can":[95],"be":[96],"flexibly":[97],"selected,":[98],"enables":[101],"us":[102],"to":[103,165],"carefully":[104],"choose":[105],"secure":[106,114],"parameters":[107],"so":[108],"proposed":[111,136],"scheme":[112,137,158],"against":[115],"known":[116],"attacks":[117],"such":[118],"rank":[120],"attacks,":[121,123],"direct":[122],"UOV":[125],"attack.":[126],"We":[127],"estimate":[128],"with":[138],"100-bit":[139],"security":[140],"about":[144],"40%":[145],"addition,":[153],"implementation":[155],"C":[161],"language":[162],"seen":[164],"generate":[166],"faster":[168],"40%.":[170]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
