Masking the GLP Lattice-Based Signature Scheme at Any Order

被引:28
|
作者
Barthe, Gilles [1 ]
Belaid, Sonia [2 ]
Espitau, Thomas [3 ]
Fouque, Pierre-Alain [4 ]
Gregoire, Benjamin [5 ]
Rossi, Melissa [6 ,7 ]
Tibouchi, Mehdi [8 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] CryptoExperts, Paris, France
[3] UPMC, Paris, France
[4] Univ Rennes, Rennes, France
[5] Inria Sophia Antipolis, Sophia Antipolis, France
[6] Thales, Paris, France
[7] PSL Res Univ, INRIA, CNRS, Dept Informat,Ecole Normale Super Paris, Paris, France
[8] NTT Secure Platform Labs, Tokyo, Japan
基金
欧盟地平线“2020”;
关键词
Side-channel; Masking; GLP lattice-based signature; FIAT-SHAMIR;
D O I
10.1007/978-3-319-78375-8_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, numerous physical attacks have been demonstrated against lattice-based schemes, often exploiting their unique properties such as the reliance on Gaussian distributions, rejection sampling and FFT-based polynomial multiplication. As the call for concrete implementations and deployment of postquantum cryptography becomes more pressing, protecting against those attacks is an important problem. However, few countermeasures have been proposed so far. In particular, masking has been applied to the decryption procedure of some lattice-based encryption schemes, but the much more difficult case of signatures (which are highly non-linear and typically involve randomness) has not been considered until now. In this paper, we describe the first masked implementation of a lattice-based signature scheme. Since masking Gaussian sampling and other procedures involving contrived probability distribution would be prohibitively inefficient, we focus on the GLP scheme of Guneysu, Lyubashevsky and Poppelmann (CHES 2012). We show how to provably mask it in the Ishai-Sahai-Wagner model (CRYPTO 2003) at any order in a relatively efficient manner, using extensions of the techniques of Coron et al. for converting between arithmetic and Boolean masking. Our proof relies on a mild generalization of probing security that supports the notion of public outputs. We also provide a proof-of-concept implementation to assess the efficiency of the proposed countermeasure.
引用
收藏
页码:354 / 384
页数:31
相关论文
共 50 条
  • [31] A Lattice-based Linkable Ring Signature Scheme for Blockchain Privacy Protection
    Gao, Yulong
    Chen, Xueting
    Shang, Wenqian
    27TH IEEE/ACIS INTERNATIONAL SUMMER CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, SNPD 2024-SUMMER, 2024, : 76 - 80
  • [32] Provably Secure Lattice-Based Self-Certified Signature Scheme
    Yang, Qiang
    Li, Daofeng
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [33] On the Security of a Lattice-Based Multi-Party Concurrent Signature Scheme
    Mao, Xianping
    Chen, Kefei
    Wang, Liangliang
    Long, Yu
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 91 - 95
  • [34] Lattice-Based Group Signature Scheme with Verifier-Local Revocation
    Langlois, Adeline
    Ling, San
    Khoa Nguyen
    Wang, Huaxiong
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 345 - 361
  • [35] A lattice-based group signature scheme with verifier-local revocation
    Ling, San
    Khoa Nguyen
    Roux-Langlois, Adeline
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2018, 730 : 1 - 20
  • [36] Short and provable secure lattice-based signature scheme in the standard model
    Wang Fenghe
    Liu Zhenhua
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3627 - 3632
  • [37] Lattice-Based Universal Designated Multi-verifiers Signature Scheme
    Zhang, Yanhua
    Susilo, Willy
    Chen, Yan
    Guo, Fuchun
    Wen, Jiaming
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 33 - 54
  • [38] A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking
    Xu, Shiyuan
    Chen, Xue
    Wang, Chao
    He, Yunhua
    Xiao, Ke
    Cao, Yibo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 70 - 83
  • [39] Lattice-based linearly homomorphic signature scheme over binary field
    FengHe Wang
    YuPu Hu
    BaoCang Wang
    Science China Information Sciences, 2013, 56 : 1 - 9
  • [40] Lattice-based linearly homomorphic signature scheme over binary field
    WANG FengHe
    HU YuPu
    WANG BaoCang
    Science China(Information Sciences), 2013, 56 (11) : 238 - 246