Abstract
Bidoux and Gaborit introduced a new general technique to improve zero-knowledge (ZK) proof-of-knowledge (PoK) schemes for a large set of well-known post-quantum hard computational problems such as the syndrome decoding, the permuted kernel, the rank syndrome decoding, and the multivariate quadratic (MQ) problems. In particular, the authors’ idea in the study of Bidoux and Gaborit was to use the structure of these problems in the multi-instance setting to minimize the communication complexity of the resulting ZK
PoK schemes. The security of the new schemes is then related to new hard problems. In this article, we focus on the new multivariate-based ZK
PoK and the corresponding new underlying problem: the so-called
1 Introduction
With the advent of post-quantum cryptography [1] following the development of Shor’s algorithm, many cryptographers have focused on finding quantum-resistant public-key systems. Multivariate cryptography is one of the main families of post-quantum primitives. The security of these systems is based on the difficulty of solving a set of randomly chosen nonlinear multivariate polynomials over a finite field. So far, there is no evidence that quantum computers can solve such sets of multivariate polynomials efficiently.
Motivated by this, Bidoux and Gaborit, in [2,3], introduced a novel general technique to enhance zero-knowledge (ZK) proof-of-knowledge (PoK) schemes for a broad class of well-known computational problems that are difficult in the post-quantum setting. In particular, they focused on the multivariate quadratic (MQ) problem, for which the definition is provided below. In the following, we denote as
Definition 1.1
(MQ problem) Let
Given
We will call the
The solution of the MQ remains computationally challenging, as it is known to be NP-hard [4]. This hardness forms the foundation of various cryptographic schemes, particularly in the field of post-quantum cryptography, where the security of multivariate public-key cryptosystems relies on the difficulty of solving large instances of the MQ. In fact, these problems are widely used as the basis for many proposed post-quantum digital signature schemes, for example, Biscuit signature scheme [5], GeMSS [6], UOV signature scheme [7], and MAYO signatures [8].
In this article, we investigate the security of a new ZKPoK based on the MQ introduced in the studies of Bidoux and Gaborit [2,3]. The ZKPoK schemes are significant due to their practical applications in cryptography [9–11]. One of the key reasons to study these schemes is that they provide a foundation for constructing highly efficient digital signature schemes, [12–14]. By leveraging the properties of zero-knowledge proofs, it is possible to design digital signatures that offer both strong security guarantees and improved performance. This makes ZKPoK particularly attractive for real-world implementations where efficiency and security are crucial.
One way to construct a signature scheme is to first construct a ZKPoK scheme and then transform it to a non-interactive signature scheme with a transformation such as the Fiat-Shamir transform [14] or the Unruh transform [15]. Looking at the NIST Post-Quantum Standardization project, three of the Round II signature schemes, MQDSS, Picnic, and Dilithium, use this approach [16].
Considering the significance of ZKPoK, Bidoux and Gaborit [2,3] presented a new ZKPoK scheme, which we will call MQBG, which is related to new variants of the
Definition 1.2
(
Given
Bidoux and Gaborit [2,3] claimed that the security of this MQBG relies on a new intermediate problem which is called the differential multivariate quadratic homogeneous (
Definition 1.3
(
with
More precisely, the
1.1 Organization of the article and main results
This article is structured as follows. In Section 2, we describe MQBG. Section 3 presents the main result of this work, that is, a probabilistic polynomial-time algorithm for solving the
Theorem 1.1
Let
To do so, we show that the
It was initially claimed that the
2 Description of the protocol and security analysis
The MQ-based ZKPoK introduced in the study of Bidoux and Gaborit [3], which we will call MQBG, is inspired by the recent ZKPoK proposed by Wang [12]. In particular, these protocols use the polar form associated with a set of quadratic equations:
Definition 2.1
(Polar form) Let
with
Note that the polar form of a multivariate quadratic map is symmetric and bilinear.
We can now quickly recall the basics of MQBG from the study of Bidoux and Gaborit [3], which is depicted in Figure 1.


The MQBG.
Let
The specificity of MQBG is to use an instance of the
A trick of this protocol is the introduction of a technique to split the secret using
In a preprocessing phase, the prover
Regarding the security of MQBG, an analysis is provided in [3, Appendix G].
3 Polynomial-time algorithm for solving the
DiffMQ
H
+
In this section, we present a polynomial-time algorithm that solves the
Theorem 3.1
Let
Proof
The idea is to consider the polar form
Let
Note then that we restrict (3) to
The algorithm has two main steps. First, we eliminate
Recovering
Let
From (5), we obtain that
Recall that
Recovering
Let
Correctness of
It remains to show that
By definition, we have
3.1 Experimental results
The following tests were run on a MacBook Air with Apple chip
|
Successful tests | Failed tests | Time to generate matrix (s) | Time to compute solution (s) | Time to verify (s) |
---|---|---|---|---|---|
10 | 99 | 1 | 0.420 | 0.001 | 0.000 |
15 | 95 | 5 | 3.165 | 0.002 | 0.000 |
20 | 98 | 2 | 13.839 | 0.009 | 0.001 |
25 | 97 | 3 | 44.607 | 0.017 | 0.002 |
30 | 94 | 6 | 118.949 | 0.028 | 0.004 |
The following tests were run with
|
|
Successful tests | Failed tests | Time to generate matrix (s) | Time to compute solution (s) | Time to verify (s) |
---|---|---|---|---|---|---|
10 | 8 | 100 | 0 | 0.269 | 0.001 | 0.000 |
15 | 13 | 100 | 0 | 2.344 | 0.002 | 0.001 |
20 | 18 | 100 | 0 | 11.222 | 0.009 | 0.001 |
25 | 23 | 100 | 0 | 37.736 | 0.016 | 0.002 |
30 | 28 | 100 | 0 | 103.552 | 0.029 | 0.002 |
From these tables, we can see that the polynomial-time algorithm that solves the
Acknowledgement
We thank Daniel Escudero and Javier Verbel for fruitful discussions. MV thanks Sorbonne University, CNRS, LIP6, PolSys, which hosted her in the Winter 2024 and the University of Salerno for their financial support. MV is a member of the “National Group for Algebraic and Geometric Structures, and their Applications” (GNSAGA - INdAM). The authors are grateful for the valuable comments of the reviewers that improved the manuscript. These results were presented in September 2024 at CIFRIS24, the Italian Congress of De Cifris (www.decifris.it/cifris24).
-
Funding information: MV received financial support from GNSAGA - INdAM. Funded by the European Union - Next Generation EU, Missione 4 Componente 1 CUP B53D23009410006, PRIN 2022- 2022PSTWLB - Group Theory and Applications. MV thanks the University of Salerno and Erasmus Traineeship grant for their financial support.
-
Author contributions: All authors have accepted responsibility for the entire content of this manuscript and consented to its submission to the journal, reviewed all results, and approved the final version of the manuscript.
-
Conflict of interest: The authors declare no conflict of interest.
-
Ethical approval: The research conducted is not related to human or animal use.
-
Data availability statement: Data sharing is not applicable to this article as no data sets were generated or analyzed during the current study.
References
[1] Bernstein D, Lange T. Post-quantum cryptography. Nature. 2017;549:188–94. 10.1038/nature23461Suche in Google Scholar PubMed
[2] Bidoux L, Gaborit P. Compact post-quantum signatures from proofs of knowledge leveraging structure for the sfPKP, sfSD and sfRSD problems. In: Hajji SE, Mesnager S, Souidi EM, editors. Codes, Cryptology and Information Security - 4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings. vol. 13874 of Lecture Notes in Computer Science. Springer; 2023. p. 10–42. 10.1007/978-3-031-33017-9_2. Suche in Google Scholar
[3] Bidoux L, Gaborit P. Shorter signatures from proofs of knowledge for the SD, MQ, PKP and RSD problems. In: arXiv Preprint; 2022. Initial version, April 2022, Creative Commons Attribution 4.0 International. https://arxiv.org/abs/2204.02915. Suche in Google Scholar
[4] Bellini E, Makarim RH, Sanna C, Verbel J. An estimator for the hardness of the MQ problem. IACR; 2022. Cryptology ePrint Archive, Paper 2022/708. https://eprint.iacr.org/2022/708. Suche in Google Scholar
[5] Bettale L, Kahrobaei D, Perret L, Verbel JA. Biscuit: new MPCitH signature scheme from structured multivariate polynomials. In: Pöpper C, Batina L, editors. Applied Cryptography and Network Security – 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I. vol. 14583 of Lecture Notes in Computer Science. Springer; 2024. p. 457–86. 10.1007/978-3-031-54770-6_18. Suche in Google Scholar
[6] Casanova A, Faugère J, Macario-Rat G, Patarin J, Perret L, Ryckeghem J. GeMSS: AGreat Multivariate Signature Scheme;. NIST round 3 post-quantum submission. Gaithersburg, Maryland, United States: National Institute of Standards and Technology (NIST). Suche in Google Scholar
[7] Kipnis A, Patarin J, Goubin L. Unbalanced oil and vinegar signature schemes. In: Stern J, editor. Advances in Cryptology - EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2–6, 1999, Proceedings. vol. 1592 of Lecture Notes in Computer Science. Springer; 1999. p. 206–22. 10.1007/3-540-48910-X_15. Suche in Google Scholar
[8] Beullens W. MAYO: Practical post-quantum signatures from oil-and-vinegar maps. In: Aitawy R, Hülsing A, editors. Selected Areas in Cryptography - 28th International Conference, SAC 2021, Virtual Event, September 29–October 1, 2021, Revised Selected Papers. vol. 13203 of Lecture Notes in Computer Science. Springer; 2021. p. 355–76. 10.1007/978-3-030-99277-4_17. Suche in Google Scholar
[9] Cayrel PL, Véron P, Alaoui SMEY. A zero-knowledge identification scheme based on the q-ary syndrome decoding problem. In: Biryukov A, Gong G, Stinson DR, editors. Selected Areas in Cryptography. vol. 6544 of Lecture Notes in Computer Science. Springer; 2010. p. 171–86. https://hal-univ-tln.archives-ouvertes.fr/hal-00674249/document. 10.1007/978-3-642-19574-7_12Suche in Google Scholar
[10] Stern J. A new paradigm for public key identification. IEEE Trans Inform Theory. 1996;42(6):1757–68. https://www.di.ens.fr/users/stern/data/St55b.pdf. 10.1109/18.556672Suche in Google Scholar
[11] Sakumoto K, Shirai T, Hiwatari H. Public-key identification schemes based on multivariate quadratic polynomials. In: Rogaway P, editor. Advances in Cryptology - CRYPTO 2011. vol. 6841 of Lecture Notes in Computer Science. Springer; 2011. p. 706–23. https://www.iacr.org/archive/crypto2011/68410703/68410703.pdf. 10.1007/978-3-642-22792-9_40Suche in Google Scholar
[12] Wang W. Shorter Signatures from MQ; 2022. https://eprint.iacr.org/2022/344. Cryptology ePrint Archive, Paper 2022/344. Suche in Google Scholar
[13] Beullens W. Sigma Protocols for MQ, PKP and SIS, and Fishy Signature Schemes; 2019. Cryptology ePrint Archive, Paper 2019/490. https://eprint.iacr.org/2019/490. Suche in Google Scholar
[14] Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems. In: Oswald E, Fischlin M, editors., Advances in Cryptology - EUROCRYPT 2015. Lecture Notes in Computer Science(), vol. 9057. Berlin, Heidelberg: Springer; 2015. https://doi.org/10.1007/978-3-662-46803-6_25 Suche in Google Scholar
[15] Unruh D. Non-interactive zero-knowledge proofs in the quantum random oracle model. In: Theory of Cryptography, 12th Theory of Cryptography Conference (TCC 2015). Springer; 2015. p. 755–84. 10.1007/978-3-662-46803-6_25Suche in Google Scholar
[16] Yesina M, Shahov BS. Analysis and research of digital signature algorithm Picnic. Radiotekhnika. 2020;4(203):19–24. https://doi.org/10.30837/rt.2020.4.203.02.10.30837/rt.2020.4.203.02Suche in Google Scholar
[17] Bettale L, Faugère J, Perret L. Security analysis of multivariate polynomials for hashing. In: Yung M, Liu P, Lin D, editors. Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14–17, 2008, Revised Selected Papers. vol. 5487 of Lecture Notes in Computer Science. Springer; 2008. p. 115–24. 10.1007/978-3-642-01440-6_11. Suche in Google Scholar
[18] Ding J, Yang B. Multivariate polynomials for hashing. In: Pei D, Yung M, Lin D, Wu C, editors. Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007, Revised Selected Papers. vol. 4990 of Lecture Notes in Computer Science. Springer; 2007. p. 358–71. 10.1007/978-3-540-79499-8_28. Suche in Google Scholar
© 2025 the author(s), published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Artikel in diesem Heft
- Research Articles
- The condition number associated with ideal lattices from odd prime degree cyclic number fields
- A small serving of mash: (Quantum) algorithms for SPDH-Sign with small parameters
- The least primitive roots mod p
- On the independence heuristic in the dual attack
- Sherlock Holmes zero-knowledge protocols secure against active attackers
- Special Issue based on CIFRIS24
- Modern techniques in somewhat homomorphic encryption
- Investigation of metabelian platform groups for protocols based on (simultaneous) conjugacy search problem
- Smaller public keys for MinRank-based schemes
- Application of Mordell–Weil lattices with large kissing numbers to acceleration of multiscalar multiplication on elliptic curves
- First-degree prime ideals of composite extensions
- Dynamic-FROST: Schnorr threshold signatures with a flexible committee
- BTLE: Atomic swaps with time-lock puzzles
- Security analysis of ZKPoK based on MQ problem in the multi-instance setting
Artikel in diesem Heft
- Research Articles
- The condition number associated with ideal lattices from odd prime degree cyclic number fields
- A small serving of mash: (Quantum) algorithms for SPDH-Sign with small parameters
- The least primitive roots mod p
- On the independence heuristic in the dual attack
- Sherlock Holmes zero-knowledge protocols secure against active attackers
- Special Issue based on CIFRIS24
- Modern techniques in somewhat homomorphic encryption
- Investigation of metabelian platform groups for protocols based on (simultaneous) conjugacy search problem
- Smaller public keys for MinRank-based schemes
- Application of Mordell–Weil lattices with large kissing numbers to acceleration of multiscalar multiplication on elliptic curves
- First-degree prime ideals of composite extensions
- Dynamic-FROST: Schnorr threshold signatures with a flexible committee
- BTLE: Atomic swaps with time-lock puzzles
- Security analysis of ZKPoK based on MQ problem in the multi-instance setting