Cryptanalysis of a code-based full-time signature

作者: Marco Baldi , Nicolas Aragon , Karan Khathuria , Paolo Santini , Edoardo Persichetti

DOI:

关键词: CryptographySet (abstract data type)Code (cryptography)Computer scienceIdentity matrixCryptanalysisSignature (logic)ExploitPublic-key cryptographyAlgorithm

摘要: We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in SHMWW contains columns coming part from identity matrix random matrix. existence of two types leads to strong bias distribution set bits produced signatures. Our exploits such recover bunch collected provide theoretical analysis along with experimental evaluations, we show as few 10 signatures are enough be for successfully recovering key. As previous attempts adapting Lyubashevsky's case cryptography, is thus proved unable acceptable security. This confirms devising secure efficient schemes remains substantially open problem area post-quantum cryptography.

参考文章(14)
Vadim Lyubashevsky, Lattice Signatures without Trapdoors Advances in Cryptology – EUROCRYPT 2012. ,vol. 7237, pp. 738- 755 ,(2012) , 10.1007/978-3-642-29011-4_43
Pierre-Louis Cayrel, Pascal Véron, Sidi Mohamed El Yousfi Alaoui, A zero-knowledge identification scheme based on the q-ary syndrome decoding problem international conference on selected areas in cryptography. ,vol. 6544, pp. 171- 186 ,(2010) , 10.1007/978-3-642-19574-7_12
Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier, How to Achieve a McEliece-Based Digital Signature Scheme international conference on the theory and application of cryptology and information security. ,vol. 2248, pp. 157- 174 ,(2001) , 10.1007/3-540-45682-1_10
Carlos Aguilar, Philippe Gaborit, Julien Schrek, None, A new zero-knowledge code based identification scheme with reduced communication information theory workshop. pp. 648- 652 ,(2011) , 10.1109/ITW.2011.6089577
E. Prange, The use of information sets in decoding cyclic codes IEEE Transactions on Information Theory. ,vol. 8, pp. 5- 9 ,(1962) , 10.1109/TIT.1962.1057777
P.W. Shor, Algorithms for quantum computation: discrete logarithms and factoring foundations of computer science. pp. 124- 134 ,(1994) , 10.1109/SFCS.1994.365700
Edoardo Persichetti, Improving the Efficiency of Code-Based Cryptography ResearchSpace@Auckland. ,(2012)
Nicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor, Durandal: A Rank Metric Based Signature Scheme theory and application of cryptographic techniques. pp. 728- 758 ,(2019) , 10.1007/978-3-030-17659-4_25
Emanuele Bellini, Florian Caullery, Philippe Gaborit, Marc Manzano, Victor Mateu, Improved Veron Identification and Signature Schemes in the Rank Metric international symposium on information theory. pp. 1872- 1876 ,(2019) , 10.1109/ISIT.2019.8849585