Cryptanalysis of a code-based full-time signature

11/16/2020
by   Nicolas Aragon, et al.
0

We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in the SHMWW scheme contains columns coming in part from an identity matrix and in part from a random matrix. The existence of two types of columns leads to a strong bias in the distribution of set bits in produced signatures. Our attack exploits such a bias to recover the private key from a bunch of collected signatures. We provide a theoretical analysis of the attack along with experimental evaluations, and we show that as few as 10 signatures are enough to be collected for successfully recovering the private key. As for previous attempts of adapting Lyubashevsky's protocol to the case of code-based cryptography, the SHMWW scheme is thus proved unable to provide acceptable security. This confirms that devising secure and efficient code-based signature schemes remains a substantially open problem in the area of post-quantum cryptography.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/25/2022

SPANSE: combining sparsity with density for efficient one-time code-based digital signatures

The use of codes defined by sparse characteristic matrices, like QC-LDPC...
research
04/07/2018

An attack on a NIST proposal: RankSign, a code-based signature in rank metric

RankSign is a code-based signature scheme proposed to the NIST competiti...
research
04/12/2021

Entropoid Based Cryptography

By analogy with the developed cryptographic theory of discrete logarithm...
research
03/01/2022

Signature Correction Attack on Dilithium Signature Scheme

Motivated by the rise of quantum computers, existing public-key cryptosy...
research
09/24/2019

Security analysis of two lightweight certificateless signature schemes

Certificateless cryptography can be considered as an intermediate soluti...
research
10/16/2018

Wave: A New Code-Based Signature Scheme

We present here Wave the first 'hash-and-sign' code-based signature sche...
research
09/20/2023

Tropical cryptography III: digital signatures

We use tropical algebras as platforms for a very efficient digital signa...

Please sign up or login with your details

Forgot password? Click here to reset