Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem

被引:0
|
作者
Bouillaguet, Charles [1 ]
Faugere, Jean-Charles
Fouque, Pierre-Alain [1 ]
Perret, Ludovic
机构
[1] Ecole Normale Super, F-75231 Paris, France
来源
关键词
GROBNER BASES; SQUARE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a practical cryptanalysis of the Identification Scheme proposed by Patarin at Crypto 1996. This scheme relies on the hardness of the Isomorphism of Polynomial with One Secret (IP1S), and enjoys shorter key than many other schemes based on the hardness of a combinatorial problem (as opposed to number-theoretic problems). Patarin proposed concrete parameters that have not been broken faster than exhaustive search so far. On the theoretical side, IP1S has been shown to be harder than Graph Isomorphism, which makes it an interesting target. We present two new deterministic algorithms to attack the IP1S problem, and we rigorously analyze their complexity and success probability. We show that they can solve a (big) constant fraction of all the instances of degree two in polynomial time. We verified that our algorithms are very efficient in practice. All the parameters with degree two proposed by Patarin are now broken in a few seconds. The parameters with degree three can be broken in less than a CPU-month. The identification scheme is thus quite badly broken.
引用
收藏
页码:473 / 493
页数:21
相关论文
共 50 条
  • [21] Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme
    Sun, Qindong
    Cao, Han
    Li, Shancang
    Song, Houbing
    Liu, Yanxiao
    MATHEMATICS, 2022, 10 (05)
  • [22] Practical Cryptanalysis of a Public Key Cryptosystem Based on the Morphism of Polynomials Problem
    Chen, Jaihui
    Tan, Chik How
    Li, Xiaoyu
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (06) : 671 - 679
  • [23] Threshold changeable secret image sharing scheme based on interpolation polynomial
    Liu, Yan-Xiao
    Yang, Ching-Nung
    Wu, Chi-Ming
    Sun, Qin-Dong
    Bi, Wei
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 18653 - 18667
  • [24] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Guttikonda Prashanti
    Mundukur Nirupama Bhat
    Multimedia Tools and Applications, 2024, 83 : 403 - 423
  • [25] Solving the Tensor Isomorphism Problem for Special Orbits with Low Rank Points: Cryptanalysis and Repair of an Asiacrypt 2023 Commitment Scheme
    Gilchrist, Valerie
    Marco, Laurane
    Petit, Christophe
    Tang, Gang
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT I, 2024, 14920 : 141 - 173
  • [26] Cryptanalysis of an efficient user identification scheme based on ID-based cryptosystem
    Liu, CL
    Horng, G
    Liu, HY
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) : 2171 - 2172
  • [27] Cryptanalysis of a Code-Based Identification Scheme Presented in CANS 2018
    Seck, Boly
    Cayrel, Pierre-Louis
    Diop, Idy
    Barbier, Morgan
    CRYPTOGRAPHY, CODES AND CYBER SECURITY, I4CS 2022, 2022, 1747 : 3 - 19
  • [28] Cryptanalysis and improvement of the novel semi-quantum secret sharing scheme based on Bell states
    Chen, Bingren
    Yang, Wei
    Huang, Liusheng
    MODERN PHYSICS LETTERS B, 2018, 32 (25):
  • [29] Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme
    Ahmadian, Zahra
    Jamshidpour, Sadegh
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (02) : 502 - 510
  • [30] Polynomial Based Progressive Secret Image Sharing Scheme With Smaller Shadow Size
    Guo, Yongzhen
    Ma, Zhuo
    Zhao, Meng
    IEEE ACCESS, 2019, 7 : 73782 - 73789