A Note on Security of Public-Key Cryptosystem Provably as Secure as Subset Sum Problem

被引:1
|
作者
Hamasho, Shinsuke [1 ]
Murakami, Yasuyuki [1 ]
机构
[1] Osaka Electrocommun Univ, Neyagawa, Osaka 5728530, Japan
关键词
subset suns problem; provable security; attack;
D O I
10.1587/transfun.E97.A.298
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In TCC2010, Lyubashevsky et al. proposed a public-key cryptosystem provably as secure as subset sum problem which will be referred to as LPS scheme. This fact gave an impact at the study of the knapsack schemes. However, this scheme seems to be very weak in practical use. In this paper, we propose an attack against LPS scheme by converting from the problem of computing the secret key into a low-density subset sum problem. Moreover, we confirm the effectiveness of the proposed attack with the computer experiment by using the conventional low-density attack proposed Coster et al. This result means that even a scheme with the provable security does not always have the practical security.
引用
收藏
页码:298 / 299
页数:2
相关论文
共 50 条
  • [31] New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
    Houzhen Wang
    Huanguo Zhang
    Shaowu Mao
    Wanqing Wu
    Liqiang Zhang
    Tsinghua Science and Technology, 2016, 21 (03) : 302 - 311
  • [32] New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
    Wang, Houzhen
    Zhang, Huanguo
    Mao, Shaowu
    Wu, Wanqing
    Zhang, Liqiang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (03) : 302 - 311
  • [33] A new product-sum public-key cryptosystem using message extension
    Katayanagi, K
    Murakami, Y
    Kasahara, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2482 - 2487
  • [34] A new product-sum public-key cryptosystem using message extension
    Kiyoko, Katanayagi
    Yasuyuki, Murakami
    Masao, Kasahara
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (10) : 2482 - 2487
  • [35] SECURITY-RELATED COMMENTS REGARDING MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    ADAMS, CM
    MEIJER, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 224 - 228
  • [36] SECURITY-RELATED COMMENTS REGARDING MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    ADAMS, CM
    MEIJER, H
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1989, 35 (02) : 454 - 455
  • [37] Provably secure public-key encryption for length-preserving Chaumian mixes
    Möller, B
    TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 244 - 262
  • [38] PIEPRZYK PUBLIC-KEY CRYPTOSYSTEM IS INSECURE
    YANG, YX
    ELECTRONICS LETTERS, 1987, 23 (20) : 1043 - 1044
  • [39] A new quadripartite public-key cryptosystem
    Nagase, T
    Koide, R
    Araki, T
    Hasegawa, Y
    IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 74 - 79
  • [40] Comment on the “Quantum Public-Key Cryptosystem”
    Ri-gui Zhou
    Wei Li
    Tian-tian Huan
    International Journal of Theoretical Physics, 2015, 54 : 1033 - 1037