Cryptanalysis of the revised NTRU signature scheme

被引:0
|
作者
Gentry, C [1 ]
Szydlo, M
机构
[1] DoCoMo USA Labs, San Jose, CA USA
[2] RSA Labs, Bedford, MA USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS | 2002年 / 2332卷
关键词
NSS; NTRU; NTRUSign; signature scheme; lattice reduction; cryptanalysis; orthogonal lattice; cyclotomic integer; galois congruence;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we describe a three-stage attack against Revised NSS, an NTRU-based signature scheme proposed at the Eurocrypt 2001 conference as an enhancement of the (broken) proceedings version of the scheme. The first stage, which typically uses a transcript of only 4 signatures, effectively cuts the key length in half while completely avoiding the intended hard lattice problem. After an empirically fast second stage, the third stage of the attack combines lattice-based and congruence-based methods in a novel way to recover the private key in polynomial time. This cryptanalysis shows that a passive adversary observing only a few valid signatures can recover the signer's entire private key. We also briefly address the security of NTRUSign, another NTRU-based signature scheme that was recently proposed at the rump session of Asiacrypt 2001. As we explain, some of our attacks on Revised NSS may be extended to NTRUSign, but a much longer transcript is necessary. We also indicate how the security of NTRUSign is based on the hardness of several problems, not solely on the hardness of the usual NTRU lattice problem.
引用
收藏
页码:299 / 320
页数:22
相关论文
共 50 条
  • [31] Cryptanalysis with Countermeasure on the SIS Based Signature Scheme
    Pursharthi, Komal
    Mishra, Dheerendra
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2023, 2024, 14412 : 92 - 100
  • [32] Cryptanalysis and improvement of a threshold proxy signature scheme
    Hu, Jianghong
    Zhang, Jianzhong
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 169 - 173
  • [33] Cryptanalysis of RGB, a mixed multivariate signature scheme
    Shim, Kyung-Ah
    Park, Cheol-Min
    Koo, Namhun
    FINITE FIELDS AND THEIR APPLICATIONS, 2017, 45 : 406 - 421
  • [34] Cryptanalysis on a proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 117 - +
  • [35] Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme
    Tan, Zuo-Wen
    Liu, Zhuo-Jun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 25 (02) : 619 - 631
  • [36] Cryptanalysis of a compact certificateless aggregate signature scheme
    Chen, Chih-Cheng
    Chien, Hanmin
    Horng, Gwoboa
    International Journal of Network Security, 2016, 18 (04) : 793 - 797
  • [37] Cryptanalysis of a Certificate-Based on Signature Scheme
    Cheng, Lin
    Xiao, Ying
    Wang, Gang
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2821 - 2825
  • [38] Cryptanalysis of the enhanced ElGamal's signature scheme
    Laih, CS
    Kuo, WC
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 228 - 231
  • [39] Identity based blind signature scheme over NTRU lattices
    Singh, Sonika
    Padhye, Sahadeo
    INFORMATION PROCESSING LETTERS, 2020, 155
  • [40] Sequential Digital Multi-Signature Scheme Based on NTRU
    Gao, Yongguo
    Yin, Xinxin
    Hao, Cheng
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 236 - 240