A new key recovery attack on a code-based signature from the Lyubashevsky framework

被引:1
|
作者
Tan, Chik How [1 ]
Prabowo, Theo Fanuela [1 ]
机构
[1] Natl Univ Singapore, Temasek Labs, 5A Engn Dr 1 09-02, Singapore 117411, Singapore
关键词
Codes; Signature; Statistical attack; Cryptography; SCHEME; IDENTIFICATION;
D O I
10.1016/j.ipl.2023.106422
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a new key recovery attack on a Hamming-metric code-based signature scheme proposed by Song, Huang, Mu, Wu, and Wang (SHMWW). Our attack extends the statistical part of the attack proposed by Aragon, Baldi, Deneuville, Khathuria, Persichetti, and Santini (ABDKPS). In addition to classifying the columns of the secret matrix, we also completely determine the entries of the identity columns of this matrix via statistical method. While we need to collect more signatures, our attack has better time complexity as it requires less than 232 and 235 operations to perform the attack for Para-1 and Para-2 respectively. This gives a tradeoff between the number of required signatures and the running time of the attack. From the simulation using a proof-of-concept Sagemath implementation, a total of no more than 1500 signatures is needed to launch the attack, which can completely recover the secret key in under 45 minutes. When performed in parallel, the attack may recover the secret key in less than 5 seconds. & COPY; 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] A code-based signature scheme from the Lyubashevsky framework
    Song, Yongcheng
    Huang, Xinyi
    Mu, Yi
    Wu, Wei
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2020, 835 : 15 - 30
  • [2] Cryptanalysis of a Code-Based Signature Scheme Based on the Schnorr-Lyubashevsky Framework
    Baldi, Marco
    Deneuville, Jean-Christophe
    Persichetti, Edoardo
    Santini, Paolo
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (09) : 2829 - 2833
  • [3] An Efficient Attack on a Code-Based Signature Scheme
    Phesso, Aurelie
    Tillich, Jean-Pierre
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 86 - 103
  • [4] A key recovery attack on an error-correcting code-based lightweight security protocol
    Erguler, Imran
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5687 - 5697
  • [5] A New Code-Based Blind Signature Scheme
    Chen, Siyuan
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    COMPUTER JOURNAL, 2022, 65 (07): : 1776 - 1786
  • [6] A code-based blind signature
    Blazy, Olivier
    Gaborit, Philippe
    Schrek, Julien
    Sendrier, Nicolas
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2718 - 2722
  • [7] A new code-based designated verifier signature scheme
    Thanalakshmi, Perumal
    Anitha, Ramalingam
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (17)
  • [8] A New Dynamic Code-Based Group Signature Scheme
    Ayebie, Berenger Edoukou
    Assidi, Hafsa
    Souidi, El Mamoun
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 346 - 364
  • [9] A new code-based digital signature based on the McEliece cryptosystem
    Makoui, Farshid Haidary
    Gulliver, Thomas Aaron
    Dakhilalian, Mohammad
    IET COMMUNICATIONS, 2023, 17 (10) : 1199 - 1207
  • [10] A New Code-Based Traceable Ring Signature Scheme
    Qi, Yanhong
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022