Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem

被引:0
|
作者
Bouillaguet, Charles [1 ]
Faugere, Jean-Charles
Fouque, Pierre-Alain [1 ]
Perret, Ludovic
机构
[1] Ecole Normale Super, F-75231 Paris, France
来源
关键词
GROBNER BASES; SQUARE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a practical cryptanalysis of the Identification Scheme proposed by Patarin at Crypto 1996. This scheme relies on the hardness of the Isomorphism of Polynomial with One Secret (IP1S), and enjoys shorter key than many other schemes based on the hardness of a combinatorial problem (as opposed to number-theoretic problems). Patarin proposed concrete parameters that have not been broken faster than exhaustive search so far. On the theoretical side, IP1S has been shown to be harder than Graph Isomorphism, which makes it an interesting target. We present two new deterministic algorithms to attack the IP1S problem, and we rigorously analyze their complexity and success probability. We show that they can solve a (big) constant fraction of all the instances of degree two in polynomial time. We verified that our algorithms are very efficient in practice. All the parameters with degree two proposed by Patarin are now broken in a few seconds. The parameters with degree three can be broken in less than a CPU-month. The identification scheme is thus quite badly broken.
引用
收藏
页码:473 / 493
页数:21
相关论文
共 50 条
  • [31] Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery
    Wang, Yongjie
    Chen, Jia
    Gong, Qinghong
    Yan, Xuehu
    Sun, Yuyuan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [32] A two-level QR code scheme based on polynomial secret sharing
    Liu, Sijia
    Fu, Zhengxin
    Yu, Bin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 21291 - 21308
  • [33] A Practical Publicly Verifiable Secret Sharing Scheme Based on Bilinear Pairing
    Tian, Youliang
    Peng, Changgen
    Zhang, Renping
    Chen, Yuling
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 71 - 75
  • [34] Novel and practical scheme based on secret sharing for laptop data protection
    Chang, Chin-Chen
    Chou, Yeh-Chieh
    Sun, Chin-Yu
    IET INFORMATION SECURITY, 2015, 9 (02) : 100 - 107
  • [35] Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery
    Ding, Wanmeng
    Liu, Kesheng
    Yan, Xuehu
    Liu, Lintao
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2018, 10 (02) : 120 - 136
  • [36] A two-level QR code scheme based on polynomial secret sharing
    Sijia Liu
    Zhengxin Fu
    Bin Yu
    Multimedia Tools and Applications, 2019, 78 : 21291 - 21308
  • [37] (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
    Harn, Lein
    Hsu, Ching-Fang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 1495 - 1504
  • [38] Forward-secure threshold signature scheme based on polynomial secret sharing
    Lu, Dian-Jun
    Zhang, Bing-Ru
    Zhao, Hai-Xing
    Tongxin Xuebao/Journal on Communication, 2009, 30 (01): : 45 - 49
  • [39] (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
    Lein Harn
    Ching-Fang Hsu
    Wireless Personal Communications, 2017, 95 : 1495 - 1504
  • [40] New multistage secret sharing scheme based on the factorization problem
    Lee, NY
    Hwang, T
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2001, 17 (03) : 525 - 529