A Note on Security of Public-Key Cryptosystem Provably as Secure as Subset Sum Problem

被引:1
|
作者
Hamasho, Shinsuke [1 ]
Murakami, Yasuyuki [1 ]
机构
[1] Osaka Electrocommun Univ, Neyagawa, Osaka 5728530, Japan
关键词
subset suns problem; provable security; attack;
D O I
10.1587/transfun.E97.A.298
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In TCC2010, Lyubashevsky et al. proposed a public-key cryptosystem provably as secure as subset sum problem which will be referred to as LPS scheme. This fact gave an impact at the study of the knapsack schemes. However, this scheme seems to be very weak in practical use. In this paper, we propose an attack against LPS scheme by converting from the problem of computing the secret key into a low-density subset sum problem. Moreover, we confirm the effectiveness of the proposed attack with the computer experiment by using the conventional low-density attack proposed Coster et al. This result means that even a scheme with the provable security does not always have the practical security.
引用
收藏
页码:298 / 299
页数:2
相关论文
共 50 条
  • [21] A brief history of provably-secure public-key encryption
    Dent, Alexander W.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 357 - 370
  • [22] A Complete Public-Key Cryptosystem
    Grigoriev, Diva
    Hirsch, Edward A.
    Pervyshev, Konstantin
    GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (01) : 1 - 12
  • [23] Quantum Public-Key Cryptosystem
    Ming-Xing Luo
    Xiu-Bo Chen
    Deng Yun
    Yi-Xian Yang
    International Journal of Theoretical Physics, 2012, 51 : 912 - 924
  • [24] Quantum Public-Key Cryptosystem
    Luo, Ming-Xing
    Chen, Xiu-Bo
    Yun, Deng
    Yang, Yi-Xian
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2012, 51 (03) : 912 - 924
  • [25] ON THE MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    VANTILBURG, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 119 - 131
  • [26] MODIFICATION OF A PUBLIC-KEY CRYPTOSYSTEM
    OKAMOTO, T
    ELECTRONICS LETTERS, 1987, 23 (16) : 814 - 815
  • [27] NEW PUBLIC-KEY CRYPTOSYSTEM
    KALIPHA, SM
    SADA, JWA
    HUSSAIN, HA
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 1990, 21 (01) : 205 - 215
  • [28] Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
    Zhang, Xin
    Chen, Kejiang
    Ding, Jinyang
    Yang, Yuqi
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3148 - 3163
  • [29] Efficient public-key cryptosystems provably secure against active adversaries
    Paillier, P
    Pointcheval, D
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 165 - 179
  • [30] Unconditionally secure public-key cryptosystem using entangled quantum states
    Li, Xiaoyu
    Ma, Yuqing
    Information Technology Journal, 2013, 12 (16) : 3820 - 3824