作者: Marco Baldi , Nicolas Aragon , Karan Khathuria , Paolo Santini , Edoardo Persichetti
DOI:
关键词: Cryptography 、 Set (abstract data type) 、 Code (cryptography) 、 Computer science 、 Identity matrix 、 Cryptanalysis 、 Signature (logic) 、 Exploit 、 Public-key cryptography 、 Algorithm
摘要: We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in SHMWW contains columns coming part from identity matrix random matrix. existence of two types leads to strong bias distribution set bits produced signatures. Our exploits such recover bunch collected provide theoretical analysis along with experimental evaluations, we show as few 10 signatures are enough be for successfully recovering key. As previous attempts adapting Lyubashevsky's case cryptography, is thus proved unable acceptable security. This confirms devising secure efficient schemes remains substantially open problem area post-quantum cryptography.