Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ming-Shing Chen is active.

Publication


Featured researches published by Ming-Shing Chen.


applied cryptography and network security | 2008

New differential-algebraic attacks and reparametrization of rainbow

Jintai Ding; Bo-Yin Yang; Chia-Hsin Owen Chen; Ming-Shing Chen; Chen-Mou Cheng

A recently proposed class of multivariate Public-Key Cryptosystems, the Rainbow-Like Digital Signature Schemes, in which successive sets of central variables are obtained from previous ones by solving linear equations, seem to lead to efficient schemes (TTS, TRMS, and Rainbow) that perform well on systems of low computational resources. Recently SFLASH (C*-) was broken by Dubois, Fouque, Shamir, and Stern via a differential attack. In this paper, we exhibit similar algebraic and diffential attacks, that will reduce published Rainbow-like schemes below their security levels. We will also discuss how parameters for Rainbow and TTS schemes should be chosen for practical applications.


international cryptology conference | 2015

Design Principles for HFEv- Based Multivariate Signature Schemes

Albrecht Petzoldt; Ming-Shing Chen; Bo-Yin Yang; Chengdong Tao; Jintai Ding

The Hidden Field Equations HFE Cryptosystem as proposed by Patarin is one of the best known and most studied multivariate schemes. While the security of the basic scheme appeared to be very weak, the HFEv- variant seems to be a good candidate for digital signature schemes on the basis of multivariate polynomials. However, the currently existing scheme of this type, the QUARTZ signature scheme, is hardly used in practice because of its poor efficiency. In this paper we analyze recent results from Ding and Yang about the degree of regularity of HFEv- systems and derive from them design principles for signature schemes of the HFEv- type. Based on these results we propose the new HFEv- based signature scheme Gui, which is more than 100 times faster than QUARTZ and therefore highly comparable with classical signature schemes such as RSA and ECDSA.


the cryptographers track at the rsa conference | 2009

Square, a New Multivariate Encryption Scheme

Crystal Clough; John B. Baena; Jintai Ding; Bo-Yin Yang; Ming-Shing Chen

We propose and analyze a multivariate encryption scheme that uses odd characteristic and an embedding in its construction. This system has a very simple core map F (X ) = X 2, allowing for efficient decryption. We also discuss ways to make this decryption faster with specific parameter choices. We give heuristic arguments along with experimental data to show that this scheme resists all known attacks.


IEEE Journal on Emerging and Selected Topics in Circuits and Systems | 2013

Securing M2M With Post-Quantum Public-Key Cryptography

Jie-Ren Shih; Yongbo Hu; Ming-Chun Hsiao; Ming-Shing Chen; Wen-Chung Shen; Bo-Yin Yang; An-Yeu Wu; Chen-Mou Cheng

In this paper, we present an ASIC implementation of two post-quantum public-key cryptosystems (PKCs): NTRUEncrypt and TTS. It represents a first step toward securing machine-to-machine (M2M) systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too “expensive” for M2M sensors, it actually can lower the total cost of ownership because of cost savings in provision, deployment, operation, maintenance, and general management. Furthermore, PKC can be more energy-efficient because PKC-based security protocols usually involve less communication than their symmetric-key-based counterparts, and communication is getting relatively more and more expensive compared with computation. More importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt and TTS included, that are orders of magnitude more efficient than traditional PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the feasibility of using hardware-based PKC to provide general data security in M2M applications.


PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography | 2008

Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and l IC-Derivatives

Anna Inn-Tung Chen; Chia-Hsin Owen Chen; Ming-Shing Chen; Chen-Mou Cheng; Bo-Yin Yang

We present instances of MPKCs (multivariate public key cryptosystems) with design, given the best attacks we know, and implement them on commodity PC hardware. We also show that they can hold their own compared to traditional alternatives. In fact, they can be up to an order of magnitude faster.


PQCrypto 2017: The Eighth International Conference on Post-Quantum Cryptography | 2017

HMFEv - An Efficient Multivariate Signature Scheme

Albrecht Petzoldt; Ming-Shing Chen; Jintai Ding; Bo-Yin Yang

Multivariate Cryptography, as one of the main candidates for establishing post-quantum cryptosystems, provides strong, efficient and well-understood digital signature schemes such as UOV, Rainbow, and Gui. While Gui provides very short signatures, it is, for efficiency reasons, restricted to very small finite fields, which makes it hard to scale it to higher levels of security and leads to large key sizes.


international symposium on symbolic and algebraic computation | 2018

Frobenius Additive Fast Fourier Transform

Wen-Ding Li; Ming-Shing Chen; Po-Chun Kuo; Chen-Mou Cheng; Bo-Yin Yang

In ISSAC 2017, van der Hoeven and Larrieu showed that evaluating a polynomial P ın Fq [x] of degree <n at all n -th roots of unity in Fqd can essentially be computed d times faster than evaluating Q ın Fqd x at all these roots, assuming Fqd contains a primitive n -th root of unity. Termed the Frobenius FFT, this discovery has a profound impact on polynomial multiplication, especially for multiplying binary polynomials, which finds ample application in coding theory and cryptography. In this paper, we show that the theory of Frobenius FFT beautifully generalizes to a class of additive FFT developed by Cantor and Gao-Mateer. Furthermore, we demonstrate the power of Frobenius additive FFT for q=2: to multiply two binary polynomials whose product is of degree <256, the new technique requires only 29,005 bit operations, while the best result previously reported was 33,397. To the best of our knowledge, this is the first time that FFT-based multiplication outperforms Karatsuba and the like at such a low degree in terms of bit-operation count.


cryptographic hardware and embedded systems | 2009

SSE Implementation of Multivariate PKCs on Modern x86 CPUs

Anna Inn-Tung Chen; Ming-Shing Chen; Tien-Ren Chen; Chen-Mou Cheng; Jintai Ding; Eric Li-Hsiang Kuo; Frost Yu-Shuang Lee; Bo-Yin Yang


IACR Cryptology ePrint Archive | 2008

Odd-Char Multivariate Hidden Field Equations.

Chia-Hsin Owen Chen; Ming-Shing Chen; Jintai Ding; Fabian Werner; Bo-Yin Yang


arXiv: Symbolic Computation | 2017

Faster Multiplication for Long Binary Polynomials.

Ming-Shing Chen; Chen-Mou Cheng; Po-Chun Kuo; Wen-Ding Li; Bo-Yin Yang

Collaboration


Dive into the Ming-Shing Chen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chen-Mou Cheng

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Jintai Ding

University of Cincinnati

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Po-Chun Kuo

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Chen-Mou Cheng

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge