ZKFault: Fault Attack Analysis on Zero-Knowledge Based Post-quantum Digital Signature Schemes

被引:0
|
作者
Mondal, Puja [1 ]
Adhikary, Supriya [1 ]
Kundu, Suparna [2 ]
Karmakar, Angshuman [1 ]
机构
[1] IIT Kanpur, Dept Comp Sci & Engn, Kanpur, Uttar Pradesh, India
[2] Katholieke Univ Leuven, COSIC, Kasteelpk Arenberg 10,Bus 2452, B-3001 Leuven, Belgium
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VIII | 2025年 / 15491卷
基金
欧盟地平线“2020”;
关键词
Post-quantum cryptography; Post-quantum signature; Code-based cryptography; Fault attacks; LESS; CROSS;
D O I
10.1007/978-981-96-0944-4_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computationally hard problems based on coding theory, such as the syndrome decoding problem, have been used for constructing secure cryptographic schemes for a long time. Schemes based on these problems are also assumed to be secure against quantum computers. However, these schemes are often considered impractical for real-world deployment due to large key sizes and inefficient computation time. In the recent call for standardization of additional post-quantum digital signatures by the National Institute of Standards and Technology, several code-based candidates have been proposed, including LESS, CROSS, and MEDS. These schemes are designed on the relatively new zero-knowledge framework. Although several works analyze the hardness of these schemes, there is hardly any work that examines the security of these schemes in the presence of physical attacks. In this work, we analyze these signature schemes from the perspective of fault attacks. All these schemes use a similar tree-based construction to compress the signature size. We attack this component of these schemes. Therefore, our attack is applicable to all of these schemes. In this work, we first analyze the LESS signature scheme and devise our attack. Furthermore, we showed how this attack can be extended to the CROSS signature scheme. Our attacks are built on very simple fault assumptions. Our results show that we can recover the entire secret key of LESS and CROSS using as little as a single fault. Finally, we propose various countermeasures to prevent these kinds of attacks and discuss their efficiency and shortcomings.
引用
收藏
页码:132 / 167
页数:36
相关论文
共 50 条
  • [21] Post-quantum cryptographic schemes based on codes
    Baldi, Marco
    2017 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2017, : 908 - 910
  • [22] Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives
    Derler, David
    Ramacher, Sebastian
    Slamanig, Daniel
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 419 - 440
  • [23] Post-Quantum Signature Schemes for 1-Ificient Hardware Implementation
    Moldovyan, Dmitriy N.
    Moldovyan, Alexandr A.
    Sklavos, Nicolas
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [24] New Approach to the Implementation of Post-Quantum Digital Signature Scheme
    Kuznetsov, Alexandr
    Kiian, Anastasiia
    Babenko, Vitalina
    Perevozova, Iryna
    Chepurko, Iryna
    Smirnov, Oleksii
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 166 - 171
  • [25] A Post-Quantum Digital Signature Using Verkle Trees and Lattices
    Iavich, Maksim
    Kuchukhidze, Tamari
    Bocu, Razvan
    SYMMETRY-BASEL, 2023, 15 (12):
  • [26] Fault Attack on Schnorr based Identification and Signature Schemes
    Fouque, Pierre-Alain
    Masgana, Delphine
    Valette, Frederic
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 32 - +
  • [27] Fault Attack on Schnorr based Identification and Signature Schemes
    Fouque, Pierre-Alain
    Masgana, Delphine
    Valette, Frederic
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 32 - +
  • [28] Zero-Knowledge Proof for Lattice-Based Group Signature Schemes with Verifier-Local Revocation
    Perera, Maharage Nisansala Sevwandi
    Koshiba, Takeshi
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018, 2019, 22 : 772 - 782
  • [29] Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser
    Wang, Ruihan
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 1760 - 1776
  • [30] SOTS: A Hash Function-Based Shorter Post-Quantum Digital Signature Scheme
    Wei, Hongru
    Huang, Jingyi
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2300 - 2309