Cryptanalysis of a Code-Based Signature Scheme Based on the Schnorr-Lyubashevsky Framework

被引:2
|
作者
Baldi, Marco [1 ]
Deneuville, Jean-Christophe [2 ]
Persichetti, Edoardo [3 ]
Santini, Paolo [1 ]
机构
[1] Marche Polytech Univ, Dept Informat Engn, I-60121 Ancona, Italy
[2] Univ Toulouse, ENAC, F-31000 Toulouse, France
[3] Florida Atlantic Univ, Dept Math Sci, Boca Raton, FL 33431 USA
关键词
Elliptic curve cryptography; Task analysis; NIST; Linear codes; Lattices; Hamming weight; Encryption; Code-based cryptography; cryptanalysis; digital signature; zero-knowledge identification scheme;
D O I
10.1109/LCOMM.2021.3096256
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We propose an attack on the recent attempt by Li, Xing and Yeo to produce a code-based signature scheme using the Schnorr-Lyubashevsky approach in the Hamming metric, and verify its effectiveness through numerical simulations. Differently from other (unsuccessful) proposals, this new scheme exploits rejection sampling along with dense noise vectors to hide the secret key structure in produced signatures. We show that these measures, besides yielding very slow signing times and rather long signatures, do not succeed in protecting the secret key. We are indeed able to prove the existence of a strong correlation between produced signatures, which ultimately leaks information about the secret key. To support this claim, we use both theoretical arguments and numerical evidences. Finally, we employ such a weakness to mount a full key recovery attack, which is able to recover the secret key after the observation of a bunch of signatures. Our results show that the considered scheme may be secure only for one-time usage.
引用
收藏
页码:2829 / 2833
页数:5
相关论文
共 50 条
  • [1] A code-based signature scheme from the Lyubashevsky framework
    Song, Yongcheng
    Huang, Xinyi
    Mu, Yi
    Wu, Wei
    Wang, Huaxiong
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 835 : 15 - 30
  • [2] A new key recovery attack on a code-based signature from the Lyubashevsky framework
    Tan, Chik How
    Prabowo, Theo Fanuela
    [J]. INFORMATION PROCESSING LETTERS, 2024, 183
  • [3] Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
    Santini, Paolo
    Baldi, Marco
    Chiaraluce, Franco
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2594 - 2598
  • [4] Cryptanalysis of a code-based full-time signature
    Nicolas Aragon
    Marco Baldi
    Jean-Christophe Deneuville
    Karan Khathuria
    Edoardo Persichetti
    Paolo Santini
    [J]. Designs, Codes and Cryptography, 2021, 89 : 2097 - 2112
  • [5] A code-based group signature scheme
    Quentin Alamélou
    Olivier Blazy
    Stéphane Cauchie
    Philippe Gaborit
    [J]. Designs, Codes and Cryptography, 2017, 82 : 469 - 493
  • [6] Cryptanalysis of a code-based full-time signature
    Aragon, Nicolas
    Baldi, Marco
    Deneuville, Jean-Christophe
    Khathuria, Karan
    Persichetti, Edoardo
    Santini, Paolo
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (09) : 2097 - 2112
  • [7] A code-based group signature scheme
    Alamelou, Quentin
    Blazy, Olivier
    Cauchie, Stephane
    Gaborit, Philippe
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2017, 82 (1-2) : 469 - 493
  • [8] Cryptanalysis of a code-based one-time signature
    Deneuville, Jean-Christophe
    Gaborit, Philippe
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (09) : 1857 - 1866
  • [9] Cryptanalysis of a code-based one-time signature
    Jean-Christophe Deneuville
    Philippe Gaborit
    [J]. Designs, Codes and Cryptography, 2020, 88 : 1857 - 1866
  • [10] Code-based Blind Signature Scheme
    Liu, Simin
    Ye, Junyao
    Zhu, Huaqing
    [J]. 2015 4TH INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL PROTECTION (ICEEP 2015), 2015, : 592 - 595