Cryptology ePrint Archive: Report 2016/1176
Leakage of Signal function with reused keys in RLWE key exchange
Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott Fluhrer and Xiaodong Lin
Abstract: In this paper, we show that the signal function used in Ring-Learning with Errors (RLWE) key exchange could leak information to find the secret $s$ of a reused public key $p=as+2e$. When RLWE public keys reused for long term, it can be exploited by initiating multiple sessions with the honest party and analyzing the output of the signal function. Experiments have confirmed the success of our attack in recovering the secret.
Category / Keywords: publickey cryptography / RLWE, key exchange, post quantum, key reuse, active attacks
Original Publication (in the same form): 2017 IEEE ICC Conference Proceedings
Date: received 22 Dec 2016, last revised 1 Mar 2017
Contact author: jintai ding at gmail com
Available format(s): PDF | BibTeX Citation
Note: Change to the abstract and some minor changes.
Version: 20170301:223640 (All versions of this report)
Short URL: ia.cr/2016/1176
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]