Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks

被引:31
|
作者
Bindel, Nina [1 ]
Buchmann, Johannes [1 ]
Kraemer, Juliane [1 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
关键词
lattice-based cryptography; signature scheme; fault attack; side channel analysis; LWE;
D O I
10.1109/FDTC.2016.11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to their high efficiency and their strong security properties, lattice-based cryptographic schemes seem to be a very promising post-quantum replacement for currently used public key cryptography. The security of lattice-based schemes has been deeply analyzed mathematically, whereas little effort has been spent on the analysis against implementation attacks. In this paper, we start with the fault analysis of one of the most important cryptographic primitives: signature schemes. We investigate the vulnerability and resistance of the currently most efficient lattice-based signature schemes BLISS (CRYPTO 2013), ring-TESLA (AfricaCrypt 2016), and the GLP scheme (CHES 2012) and their implementations. We consider different kinds of (first-order) randomizing, zeroing, and skipping faults. For each of the signature schemes, we found at least six effective attacks. To increase the security of lattice-based signature schemes, we propose countermeasures for each of the respective attacks.
引用
收藏
页码:63 / 77
页数:15
相关论文
共 50 条
  • [21] Improved lattice-based ring signature schemes from basis delegation
    Gao Wen
    Hu Yupu
    Wang Baocang
    Xie Jia
    The Journal of China Universities of Posts and Telecommunications, 2016, (03) : 11 - 17
  • [22] Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography
    Ravi, Prasanna
    Chattopadhyay, Anupam
    Bhasin, Shivam
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 188 - 189
  • [23] Design of lattice-based ElGamal encryption and signature schemes using SIS problem
    Gupta, Daya Sagar
    Biswas, G. P.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (06):
  • [24] Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem
    An, Youngjoo
    Lee, Hyang-Sook
    Lee, Juhee
    Lim, Seongan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [25] Lattice-Based Revocable Certificateless Signature
    Hung, Ying-Hao
    Tseng, Yuh-Min
    Huang, Sen-Shan
    SYMMETRY-BASEL, 2017, 9 (10):
  • [26] A lattice-based partially blind signature
    Tian, Haibo
    Zhang, Fangguo
    Wei, Baodian
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1820 - 1828
  • [27] A survey on lattice-based digital signature
    Liu, Fengxia
    Zheng, Zhiyong
    Gong, Zixian
    Tian, Kun
    Zhang, Yi
    Hu, Zhe
    Li, Jia
    Xu, Qun
    CYBERSECURITY, 2024, 7 (01)
  • [28] Lattice-based undeniable signature scheme
    Rawal, Swati
    Padhye, Sahadeo
    He, Debiao
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (3-4) : 119 - 126
  • [29] A Lattice-Based Incremental Signature Scheme
    Chen, Jing
    Tian, Miaomiao
    Gao, Chuang
    Chen, Zhili
    IEEE ACCESS, 2019, 7 : 21201 - 21210
  • [30] Lightweight Lattice-Based Signature for VANET
    Wu, Faguo
    Li, Bengang
    2022 IEEE 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION ENGINEERING, ICITE, 2022, : 406 - 411