Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Public Key Cryptography
  3. Conference paper

Solving Underdefined Systems of Multivariate Quadratic Equations

  • Conference paper
  • First Online: 01 January 2002
  • pp 211–227
  • Cite this conference paper
Save conference paper
View saved research
Public Key Cryptography (PKC 2002)
Solving Underdefined Systems of Multivariate Quadratic Equations
  • Nicolas Courtois5,
  • Louis Goubin5,
  • Willi Meier6 &
  • …
  • Jean-Daniel Tacier6 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2274))

Included in the following conference series:

  • International Workshop on Public Key Cryptography
  • 3338 Accesses

  • 53 Citations

  • 3 Altmetric

Abstract

The security of several recent digital signature schemes is based on the difficulty of solving large systems of quadratic multivariate polynomial equations over a finite field F. This problem, sometimes called MQ, is known to be NP-hard. When the number m of equations is equal to the number n of variables, and if n < 15, Gröbner base algorithms have been applied to solve MQ. In the overdefined case n 《 m, the techniques of relinearization and XL, due to A. Shamir et. al., have shown to be successful for solving MQ. In signature schemes, we usually have n 》 m. For example signature schemes Flash and Sflash submitted to Nessie call for primitives or the UOV scheme published at Eurocrypt 1999. Little is known about the security of such underdefined systems. In this paper, three new and different methods are presented for solving underdefined multivariate systems of quadratic equations. As already shown at Eurocrypt 1999, the problem MQ becomes polynomial when n ≥ m(m+1) for fields F of characteristic 2. We show that for any field, for about n ≥ 2m/7(m + 1), exponential but quite small in practice, the problem becomes polynomial in n.

When n → m the complexity of all our 3 algorithms tends to q m. However for practical instances of cryptosystems with n ≈ O(m), we show how to achieve complexities significantly lower than exhaustive search. For example we are able break Unbalanced Oil and Vinegar signature schemes for some “bad” choices of the parameters (but not for the parameters proposed in [4]).

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

An Estimator for the Hardness of the MQ Problem

Chapter © 2022

Multivariate Cryptosystem Based on a Quadratic Equation to Eliminate the Outliers Using Homomorphic Encryption Scheme

Chapter © 2023

Cryptanalysis and Countermeasures on Multivariate Polynomial-Based Group Signature Scheme

Chapter © 2026

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Algorithmic Complexity
  • Algorithm Analysis and Problem Complexity
  • Algebra
  • Computational Complexity
  • Linear Algebra
  • Multilinear Algebra
  • Multivariate Cryptography and Algorithmic Approaches

References

  1. N. Courtois, A. Klimov, J. Patarin, A. Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, Advances in Cryptology — EUROCRYPT’2000, Proceedings, B. Preneel (Ed.), Lecture Notes in Computer Science, Springer Verlag, vol. 1807, pp. 392–407.

    Google Scholar 

  2. J.-Ch. Faugère, A new efficient algorithm for computing Gröbner bases (F 4), Journal of Pure and Applied Algebra 139 (1999), pp. 61–88. See http://www.elsevier.com/locate/jpaa.

    Article  MATH  MathSciNet  Google Scholar 

  3. M. R. Garey, D. S. Johnson, Computers and Intractability, A Guide to the Theory of NP-completeness, W. H. Freeman and Company, New York, 1979.

    MATH  Google Scholar 

  4. A. Kipnis, J. Patarin, L. Goubin, Unbalanced Oil and Vinegar Signature Schemes, Advances in Cryptology — EUROCRYPT’99, Proceedings, J. Stern (Ed.), Lecture Notes in Computer Science, Springer Verlag, vol. 1592, pp. 206–222.

    Google Scholar 

  5. A. Kipnis, A. Shamir, Cryptanalysis of the Oil and Vinegar Signature Scheme, Advances in Cryptology — CRYPTO’98, Proceedings, H. Krawczyk (Ed.), Lecture Notes in Computer Science, Springer Verlag, vol. 1462, pp. 257–266.

    Google Scholar 

  6. A. Kipnis, A. Shamir, Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, Advances in Cryptology — CRYPTO’99, Proceedings, M. Wiener (Ed.), Lecture Notes in Computer Science, Springer Verlag, vol. 1666, pp. 19–30.

    Google Scholar 

  7. R. Lidl, R. Niederreiter, Finite fields, Encyclopedia of mathematics and its applications, vol. 20, 1997.

    Google Scholar 

  8. A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of applied cryptography, CRC Press, 1996.

    Google Scholar 

  9. J. Patarin, N. Courtois, L. Goubin, FLASH, a Fast Multivariate Signature Algorithm, in Progress in Cryptology—CT-RSA 2001, D. Nacchache, ed., vol 2020, Springer Lecture Notes in Computer Science, pp. 298–307.

    Chapter  Google Scholar 

  10. J. Patarin, L. Goubin, N. Courtois, Quartz, 128-bit long digital signatures, Cryptographers’ Track RSA Conference 2001, San Francisco 8–12 Avril 2001, LNCS2020, Springer-Verlag. Also published in Proceedings of the First Open NESSIE Workshop, 13-14 November 2000, Leuven, Belgium.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. CP8 Crypto Lab, SchlumbergerSema, 36-38 rue de la Princesse, BP45, F-78430, Louveciennes Cedex, France

    Nicolas Courtois & Louis Goubin

  2. FH Aargau, CH-5210, Windisch

    Willi Meier & Jean-Daniel Tacier

Authors
  1. Nicolas Courtois
    View author publications

    Search author on:PubMed Google Scholar

  2. Louis Goubin
    View author publications

    Search author on:PubMed Google Scholar

  3. Willi Meier
    View author publications

    Search author on:PubMed Google Scholar

  4. Jean-Daniel Tacier
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Gemplus International, Cryptography and Security Group, 34 Rue Guynemer, 92447, Issy-le-Moulineaux, France

    David Naccache  & Pascal Paillier  & 

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Courtois, N., Goubin, L., Meier, W., Tacier, JD. (2002). Solving Underdefined Systems of Multivariate Quadratic Equations. In: Naccache, D., Paillier, P. (eds) Public Key Cryptography. PKC 2002. Lecture Notes in Computer Science, vol 2274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45664-3_15

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/3-540-45664-3_15

  • Published: 05 February 2002

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43168-8

  • Online ISBN: 978-3-540-45664-3

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Quadratic Form
  • Linear Form
  • Quadratic Equation
  • Exhaustive Search
  • Signature Scheme

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Footer Navigation

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover

Corporate Navigation

  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

162.0.217.198

Not affiliated

Springer Nature

© 2026 Springer Nature