Masking the GLP Lattice-Based Signature Scheme at Any Order

被引:28
|
作者
Barthe, Gilles [1 ]
Belaid, Sonia [2 ]
Espitau, Thomas [3 ]
Fouque, Pierre-Alain [4 ]
Gregoire, Benjamin [5 ]
Rossi, Melissa [6 ,7 ]
Tibouchi, Mehdi [8 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] CryptoExperts, Paris, France
[3] UPMC, Paris, France
[4] Univ Rennes, Rennes, France
[5] Inria Sophia Antipolis, Sophia Antipolis, France
[6] Thales, Paris, France
[7] PSL Res Univ, INRIA, CNRS, Dept Informat,Ecole Normale Super Paris, Paris, France
[8] NTT Secure Platform Labs, Tokyo, Japan
基金
欧盟地平线“2020”;
关键词
Side-channel; Masking; GLP lattice-based signature; FIAT-SHAMIR;
D O I
10.1007/978-3-319-78375-8_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, numerous physical attacks have been demonstrated against lattice-based schemes, often exploiting their unique properties such as the reliance on Gaussian distributions, rejection sampling and FFT-based polynomial multiplication. As the call for concrete implementations and deployment of postquantum cryptography becomes more pressing, protecting against those attacks is an important problem. However, few countermeasures have been proposed so far. In particular, masking has been applied to the decryption procedure of some lattice-based encryption schemes, but the much more difficult case of signatures (which are highly non-linear and typically involve randomness) has not been considered until now. In this paper, we describe the first masked implementation of a lattice-based signature scheme. Since masking Gaussian sampling and other procedures involving contrived probability distribution would be prohibitively inefficient, we focus on the GLP scheme of Guneysu, Lyubashevsky and Poppelmann (CHES 2012). We show how to provably mask it in the Ishai-Sahai-Wagner model (CRYPTO 2003) at any order in a relatively efficient manner, using extensions of the techniques of Coron et al. for converting between arithmetic and Boolean masking. Our proof relies on a mild generalization of probing security that supports the notion of public outputs. We also provide a proof-of-concept implementation to assess the efficiency of the proposed countermeasure.
引用
收藏
页码:354 / 384
页数:31
相关论文
共 50 条
  • [41] Lattice-based linearly homomorphic signature scheme over binary field
    Wang FengHe
    Hu YuPu
    Wang BaoCang
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (11) : 1 - 9
  • [42] A lattice-based partially blind signature
    Tian, Haibo
    Zhang, Fangguo
    Wei, Baodian
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1820 - 1828
  • [43] Lattice-Based Revocable Certificateless Signature
    Hung, Ying-Hao
    Tseng, Yuh-Min
    Huang, Sen-Shan
    SYMMETRY-BASEL, 2017, 9 (10):
  • [44] Lattice-based blind signature schemes
    Wang, Fenghe
    Hu, Yupu
    Wang, Chunxiao
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 550 - 553
  • [45] A survey on lattice-based digital signature
    Liu, Fengxia
    Zheng, Zhiyong
    Gong, Zixian
    Tian, Kun
    Zhang, Yi
    Hu, Zhe
    Li, Jia
    Xu, Qun
    CYBERSECURITY, 2024, 7 (01)
  • [46] Lightweight Lattice-Based Signature for VANET
    Wu, Faguo
    Li, Bengang
    2022 IEEE 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION ENGINEERING, ICITE, 2022, : 406 - 411
  • [47] Efficient Lattice-Based Ring Signature Scheme without Trapdoors for Machine Learning
    Ye, Qing
    Lang, Yongkang
    Zhao, Zongqu
    Chen, Qingqing
    Tang, Yongli
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [48] Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme
    Bruinderink, Leon Groot
    Hulsing, Andreas
    Lange, Tanja
    Yarom, Yuval
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 323 - 345
  • [49] A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch
    Zheng, Mingmei
    Liu, Zi-Yuan
    Mambo, Masahiro
    IEEE ACCESS, 2023, 11 : 62510 - 62521
  • [50] A New Lattice-Based Signature Scheme in Post-Quantum Blockchain Network
    Li, Chao-Yang
    Chen, Xiu-Bo
    Chen, Yu-Ling
    Hou, Yan-Yan
    Li, Jian
    IEEE ACCESS, 2019, 7 : 2026 - 2033