Paper 2020/923
Another code-based adaptation of Lyubashevsky’s signature cryptanalysed
Nicolas Aragon, Jean-Christophe Deneuville, and Philippe Gaborit
Abstract
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on lattice assumptions. Several works attempted to make this approach compliant with the coding theory setting, unsuccessfully. Recently, Song et al. proposed another adaptation of this framework, using denser and permuted secret keys, claiming immunity against existing attacks. This paper describes an efficient attack against Song et al. signature scheme. We show that it is possible to fully recover the secret key from a very limited number of signatures. As an example, it requires 32 signatures and 2 hours to recover the secret key of the parameter set targeting 80 bits of security. The attack affects both proposed parameter sets, and discourages patching such an approach.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- cryptanalysisdigital signaturescoding theorypost-quantum cryptography
- Contact author(s)
- jean-christophe deneuville @ enac fr
- History
- 2020-07-26: received
- Short URL
- https://ia.cr/2020/923
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/923, author = {Nicolas Aragon and Jean-Christophe Deneuville and Philippe Gaborit}, title = {Another code-based adaptation of Lyubashevsky’s signature cryptanalysed}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/923}, year = {2020}, url = {https://eprint.iacr.org/2020/923} }