A new key recovery attack on a code-based signature from the Lyubashevsky framework

被引:1
作者
Tan, Chik How [1 ]
Prabowo, Theo Fanuela [1 ]
机构
[1] Natl Univ Singapore, Temasek Labs, 5A Engn Dr 1 09-02, Singapore 117411, Singapore
关键词
Codes; Signature; Statistical attack; Cryptography; SCHEME; IDENTIFICATION;
D O I
10.1016/j.ipl.2023.106422
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a new key recovery attack on a Hamming-metric code-based signature scheme proposed by Song, Huang, Mu, Wu, and Wang (SHMWW). Our attack extends the statistical part of the attack proposed by Aragon, Baldi, Deneuville, Khathuria, Persichetti, and Santini (ABDKPS). In addition to classifying the columns of the secret matrix, we also completely determine the entries of the identity columns of this matrix via statistical method. While we need to collect more signatures, our attack has better time complexity as it requires less than 232 and 235 operations to perform the attack for Para-1 and Para-2 respectively. This gives a tradeoff between the number of required signatures and the running time of the attack. From the simulation using a proof-of-concept Sagemath implementation, a total of no more than 1500 signatures is needed to launch the attack, which can completely recover the secret key in under 45 minutes. When performed in parallel, the attack may recover the secret key in less than 5 seconds. & COPY; 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:7
相关论文
共 40 条
  • [31] Attack on an ID-based authenticated group key agreement scheme from PKC 2004
    Zhang, FG
    Chen, XF
    INFORMATION PROCESSING LETTERS, 2004, 91 (04) : 191 - 193
  • [32] LWT-DSR based new robust framework for watermark extraction under intentional attack conditions
    Verma, Vivek Singh
    Jha, Rajib Kumar
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2017, 354 (14): : 6422 - 6449
  • [33] New ID-Based Proxy Multi-signature from Pairings
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 174 - 184
  • [34] Public-key encryption from ID-based encryption without one-time signature
    Tan, Chik How
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 450 - 459
  • [35] Nanobiosensor Based on Sugar Code-AuNPs Aggregation: A Key to Opening New Gates in Rapid Diagnosis of Streptococcal Pharyngitis
    Mohajeri, Sahar
    Moayedi, Saeed
    Azimi, Leila
    Akrami, Mohammad
    Rad-Malekshahi, Mazda
    Fazeli, Mohammad Reza
    Fallah, Fatemeh
    Haririan, Ismaeil
    FRONTIERS IN BIOENGINEERING AND BIOTECHNOLOGY, 2022, 10
  • [36] A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort
    Zhang, Pingyuan
    Jiang, Han
    Zheng, Zhihua
    Wang, Hao
    Xu, Qiuliang
    COMPUTER JOURNAL, 2022, 65 (09) : 2400 - 2410
  • [37] New identity-based society oriented signature schemes from pairings on elliptic curves
    Lin, CY
    Wu, TC
    Zhang, FG
    Hwang, JJ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 160 (01) : 245 - 260
  • [38] Secret handshakes from ID-based message recovery signatures: A new generic approach
    Wen, Yamin
    Zhang, Fangguo
    Xu, Lingling
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (01) : 96 - 104
  • [39] A New Clustering-Based Framework to the Stem Estimation and Growth Fitting of Street Trees From Mobile Laser Scanning Data
    Xu, Sheng
    Sun, Xinyu
    Yun, Jiayan
    Wang, Hao
    IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2020, 13 (13) : 3240 - 3250
  • [40] A new hybrid method for 3D object recovery from 2D drawings and its validation against the cubic corner method and the optimisation-based method
    Lee, Yong Tsui
    Fang, Fen
    COMPUTER-AIDED DESIGN, 2012, 44 (11) : 1090 - 1102