You are looking at a specific version 20170301:223640 of this paper.
See the latest version.
Paper 2016/1176
Leakage of Signal function with reused keys in RLWE key exchange
Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott Fluhrer and Xiaodong Lin
Abstract
In this paper, we show that the signal function used in Ring-Learning with Errors (RLWE) key exchange could leak information to find the secret $s$ of a reused public key $p=as+2e$. When RLWE public keys reused for long term, it can be exploited by initiating multiple sessions with the honest party and analyzing the output of the signal function. Experiments have confirmed the success of our attack in recovering the secret.
Note: Change to the abstract and some minor changes.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. 2017 IEEE ICC Conference Proceedings
- Keywords
- publickey cryptographyRLWEkey exchangepost quantumkey reuseactive attacks
- Contact author(s)
- jintai ding @ gmail com
- History
- 2017-12-05: last of 3 revisions
- 2016-12-30: received
- See all versions
- Short URL
- https://ia.cr/2016/1176
- License
-
CC BY