Paper 2020/923

Another code-based adaptation of Lyubashevsky’s signature cryptanalysed

Nicolas Aragon, Jean-Christophe Deneuville, and Philippe Gaborit

Abstract

In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on lattice assumptions. Several works attempted to make this approach compliant with the coding theory setting, unsuccessfully. Recently, Song et al. proposed another adaptation of this framework, using denser and permuted secret keys, claiming immunity against existing attacks. This paper describes an efficient attack against Song et al. signature scheme. We show that it is possible to fully recover the secret key from a very limited number of signatures. As an example, it requires 32 signatures and 2 hours to recover the secret key of the parameter set targeting 80 bits of security. The attack affects both proposed parameter sets, and discourages patching such an approach.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
cryptanalysisdigital signaturescoding theorypost-quantum cryptography
Contact author(s)
jean-christophe deneuville @ enac fr
History
2020-07-26: received
Short URL
https://ia.cr/2020/923
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/923,
      author = {Nicolas Aragon and Jean-Christophe Deneuville and Philippe Gaborit},
      title = {Another code-based adaptation of Lyubashevsky’s signature cryptanalysed},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/923},
      year = {2020},
      url = {https://eprint.iacr.org/2020/923}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.