Efficient Nyberg-Rueppel type of NTRU digital signature algorithm

被引:2
作者
Elverdi, Ferdi [1 ]
Akleylek, Sedat [2 ]
Kirlar, Baris Bulent [3 ]
机构
[1] Suleyman Demirel Univ, Grad Sch Nat & Appl Sci, Dept Math, Isparta, Turkey
[2] Ondokuz Mayis Univ, Fac Engn, Dept Comp Engn, Samsun, Turkey
[3] Suleyman Demirel Univ, Fac Arts & Sci, Dept Math, Isparta, Turkey
关键词
THE-MIDDLE ATTACK; MESSAGE TRANSMISSION; LATTICE-REDUCTION; CRYPTANALYSIS; RECOVERY;
D O I
10.3906/mat-2102-116
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Message recovery is an important property in Nyberg-Rueppel type digital signature algorithms. However, the security of Nyberg-Rueppel type digital signature algorithms depends on the hard problems which might be vulnerable to quantum attacks. Therefore, quantum resistant Nyberg-Rueppel type digital signature algorithms with message recovery property are needed. Since NTRU-based cryptosystems are one of the best studied quantum-resistant schemes, using traditional NTRU encryption scheme has several advantages on the message recovery property. In this paper, we define Nyberg-Rueppel type of NTRU digital signature algorithm. It is carried out by combining NTRU-based encryption and signature algorithms. In the proposed scheme, efficient message recovery property is achieved with the help of NTRU. Then, we compare the computational cost of our Nyberg-Rueppel type signature scheme with the others in terms of the arithmetic complexity. According to the asymptotic complexity results, the proposed scheme has better arithmetic complexity than Nyberg-Rueppel type schemes. We also discuss the security properties of the proposed scheme by modifying attacks on Nyberg-Rueppel type algorithms and lattice-based algorithms.
引用
收藏
页码:59 / 70
页数:12
相关论文
共 45 条
[11]   Optimizing Polynomial Convolution for NTRUEncrypt [J].
Dai, Wei ;
Whyte, William ;
Zhang, Zhenfei .
IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (11) :1572-1583
[12]   Modular lattice signatures, revisited [J].
Das, Dipayan ;
Hoffstein, Jeffrey ;
Pipher, Jill ;
Whyte, William ;
Zhang, Zhenfei .
DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (03) :505-532
[13]  
Ducas L, 2013, LECT NOTES COMPUT SC, V8042, P40, DOI 10.1007/978-3-642-40041-4_3
[14]  
Ducas L, 2012, LECT NOTES COMPUT SC, V7658, P433, DOI 10.1007/978-3-642-34961-4_27
[15]  
Dwork, ECCC 1996
[16]  
Gentry C, 2002, LECT NOTES COMPUT SC, V2332, P299
[17]  
Goldreich O, 1997, LECT NOTES COMPUT SC, V1294, P112
[18]  
Hoffstein J., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P267, DOI 10.1007/BFb0054868
[19]  
Hoffstein J, 2003, LECT NOTES COMPUT SC, V2612, P122
[20]  
Hoffstein J, 2001, LECT NOTES COMPUT SC, V2045, P211