JAIST Repository >
b. 情報科学研究科・情報科学系 >
b10. 学術雑誌論文等 >
b10-1. 雑誌掲載論文 >
このアイテムの引用には次の識別子を使用してください:
http://hdl.handle.net/10119/17028
|
タイトル: | An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks |
著者: | Muroi, Akifumi Okumura, Shinya Miyaji, Atsuko |
キーワード: | IE-LWE problem evaluation at one attack closest vector problem |
発行日: | 2020-01-10 |
出版者: | Springer |
誌名: | Lecture Notes in Computer Science |
巻: | 11959 |
開始ページ: | 421 |
終了ページ: | 436 |
DOI: | 10.1007/978-3-030-38471-5_17 |
抄録: | Akiyama, Goto, Okumura, Takagi, Nuida and Hanaoka introduced an indeterminate equation analogue of learning with errors (IE-LWE) problem as a new computationally hard problem and constructed a candidate of post-quantum cryptosystem, called “Giophantus”. Giophantus satisfies the indistinguishability under chosen plaintext attack (IND-CPA) if IE-LWE problem is computationally infeasible. Akiyama et al., Shimizu and Ikematsu proposed improved Giophantus to the post-quantum standardization project. Beullens, Castryck and Vercauteren proposed an evaluation at one attack against IND-CPA security of Giophantus. However, Akiyama et al. assert that recommended parameters can resist Vercauteren et al.’s attack. Therefore, the security analysis on Giophantus is still needed. In this paper, we propose a new kind of evaluation attack against IND-CPA security of Giophantus. Our attack solves IE-LWE problem by combining a part of Vercauteren et al.’s attack with a lattice attack on low rank lattices, e.g., 6-rank lattices for recommended parameters. Moreover, we investigate a way to avoid our attack and some variants of our attack. We give some remarks on modification of the IE-LWE problem. Our experimental analysis shows that our attack can solve IE-LWE problem efficiently, and that Giophantus does not satisfy IND-CPA security unless IE-LWE problem is modified appropriately. |
Rights: | This is the author-created version of Springer, Muroi A., Okumura S., Miyaji A. (2020) An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks. In: Paterson K., Stebila D. (eds) Selected Areas in Cryptography – SAC 2019. SAC 2019. Lecture Notes in Computer Science, vol 11959. The original publication is available at www.springerlink.com, http://dx.doi.org/10.1007/978-3-030-38471-5_17 |
URI: | http://hdl.handle.net/10119/17028 |
資料タイプ: | author |
出現コレクション: | b10-1. 雑誌掲載論文 (Journal Articles)
|
このアイテムのファイル:
ファイル |
記述 |
サイズ | 形式 |
SAC2019-teamFE.pdf | | 127Kb | Adobe PDF | 見る/開く |
|
当システムに保管されているアイテムはすべて著作権により保護されています。
|