Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange

被引:2
|
作者
Gong, Boru [1 ,2 ]
Zhao, Yunlei [1 ,2 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai Key Lab Data Sci, Shanghai, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
来源
关键词
D O I
10.1007/978-3-319-59879-6_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key exchange (AKE) plays a fundamental role in modern cryptography. Up to now, the HMQV protocol family is among the most efficient provably secure AKE protocols, which has been widely standardized and in use. Given recent advances in quantum computing, it would be desirable to develop lattice-based analogue of HMQV for the possible upcoming post-quantum era. Towards this goal, a family of AKE schemes from ideal lattice was recently proposed at Eurocrypt 2015 [Z ZD+15], which could be seen as an HMQV-analogue based on the ring-LWE (RLWE) problem. It consists a two-pass variant Pi(2) and a one-pass variant Pi(1). As a supplement to its security analysis, we propose an efficient attack against Pi(1), which is referred to as the small field attack (SFA) since it fully utilizes the algebraic structure of the ring R-q in RLWE. The SFA attack can efficiently recover the static private key of the victim party in Pi(1), provided adversaries are allowed to register their own public keys. Such an assumption is reasonable in practice, but may not be allowed in the security model of Pi(1) [ZZD+15]. We also show that it is hard for the victim party to even detect the attack in practice.
引用
收藏
页码:163 / 183
页数:21
相关论文
共 50 条
  • [1] IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol
    Huang, Hai
    Cao, Zhenfu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1153 - 1161
  • [2] A computationally efficient and randomized RLWE-based key exchange scheme
    Pursharthi, Komal
    Mishra, Dheerendra
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 1599 - 1610
  • [3] A computationally efficient and randomized RLWE-based key exchange scheme
    Komal Pursharthi
    Dheerendra Mishra
    [J]. Cluster Computing, 2024, 27 : 1599 - 1610
  • [4] Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack
    Gao, Xinwei
    Ding, Jintai
    Li, Lin
    Liu, Jiqiang
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (11) : 1584 - 1593
  • [5] Strongly secure certificateless one-pass authenticated key agreement scheme
    Huang, Baojun
    Tu, Hang
    [J]. KUWAIT JOURNAL OF SCIENCE, 2015, 42 (01) : 91 - 108
  • [6] COMPARISON ANALYSIS OF DING'S RLWE-BASED KEY EXCHANGE PROTOCOL AND NEWHOPE VARIANTS
    Gao, Xinwei
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2019, 13 (02) : 221 - 233
  • [7] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)
  • [8] One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
    Mishra, Manoj Ranjan
    Kar, Jayaprakash
    Majhi, Banshidhar
    [J]. 2014 INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS), 2014,
  • [9] Comment on a certificateless one-pass and two-party authenticated key agreement protocol
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    Shen, Jian
    [J]. INFORMATION SCIENCES, 2016, 369 : 184 - 187
  • [10] Cryptanalysis of two password authenticated key exchange protocols based on RSA
    Cao, Tianjie
    Lim, Dongdai
    [J]. IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) : 623 - 625