{"created":"2025-01-19T01:04:37.476975+00:00","updated":"2025-01-19T21:04:40.417197+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00201351","sets":["6164:6165:6462:10022"]},"path":["10022"],"owner":"44499","recid":"201351","title":["A Hybrid Method for Solving the Minrank Problem"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-10-14"},"_buckets":{"deposit":"d1635465-63e7-4f6f-a645-0d2866f94a6d"},"_deposit":{"id":"201351","pid":{"type":"depid","value":"201351","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"A Hybrid Method for Solving the Minrank Problem","author_link":["492033","492038","492036","492040","492037","492035","492034","492039"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A Hybrid Method for Solving the Minrank Problem"},{"subitem_title":"A Hybrid Method for Solving the Minrank Problem","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Minrank Problem,Multivariate Cryptography,Gr?bner basis","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2019-10-14","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Department of Mathematical Informatics, University of Tokyo"},{"subitem_text_value":"Institute of Mathematics for Industry, Kyushu University"},{"subitem_text_value":"Department of Liberal Arts and Basic Sciences, Nihon University"},{"subitem_text_value":"Department of Mathematical Informatics, University of Tokyo"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Mathematical Informatics, University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Institute of Mathematics for Industry, Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Department of Liberal Arts and Basic Sciences, Nihon University","subitem_text_language":"en"},{"subitem_text_value":"Department of Mathematical Informatics, University of Tokyo","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/201351/files/IPSJCSS2019058.pdf","label":"IPSJCSS2019058.pdf"},"date":[{"dateType":"Available","dateValue":"2021-10-14"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2019058.pdf","filesize":[{"value":"322.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"85c625bd-7712-49f1-a42d-30cb6221cf0d","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yacheng, Wang"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yasuhiko, Ikematsu"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shuhei, Nakamura"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tsuyoshi, Takagi"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yacheng, Wang","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yasuhiko, Ikematsu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shuhei, Nakamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tsuyoshi, Takagi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"The minrank problem is often considered in the cryptanalysis of multivariate public key cryptography (MPKC) and code-based cryptography. There have been many multivariate cryptosystems proven insecure due to their weakness against the minrank attack, which is an attack that transforms breaking a cryptosystem into solving a minrank problem instance. In this paper, we review two methods, the Kipnis-Shamir method, and minors modeling for solving a minrank instance, and then propose a hybrid method that combines these two modeling methods. Our new method manages to avoid the disadvantages of the Kipnis-Shamir method and minors modeling, and it at least is as effective as the Kipnis-Shamir method. Moreover, we consider the proposed hybrid method with different types of variables specified, from which possible improvements can be brought to the proposed hybrid method. We also apply our hybrid method on one of NIST Post-quantum cryptography round 2 submissions, Rainbow.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The minrank problem is often considered in the cryptanalysis of multivariate public key cryptography (MPKC) and code-based cryptography. There have been many multivariate cryptosystems proven insecure due to their weakness against the minrank attack, which is an attack that transforms breaking a cryptosystem into solving a minrank problem instance. In this paper, we review two methods, the Kipnis-Shamir method, and minors modeling for solving a minrank instance, and then propose a hybrid method that combines these two modeling methods. Our new method manages to avoid the disadvantages of the Kipnis-Shamir method and minors modeling, and it at least is as effective as the Kipnis-Shamir method. Moreover, we consider the proposed hybrid method with different types of variables specified, from which possible improvements can be brought to the proposed hybrid method. We also apply our hybrid method on one of NIST Post-quantum cryptography round 2 submissions, Rainbow.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"407","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2019論文集"}],"bibliographicPageStart":"400","bibliographicIssueDates":{"bibliographicIssueDate":"2019-10-14","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2019"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":201351,"links":{}}