Paper 2024/596

Cryptanalysis of signature schemes based on the root extraction problem over braid group

Djimnaibeye Sidoine, INSTA
Guy Mobouale Wamba, Universite Marien Ngouabi
Abiodoun Clement Hounkpevi, UCAD
Tieudjo Daniel, Ngaoundere university
Djiby Sow, UCAD
Abstract

Cumplido, María et al. have recently shown that the Wang-Hu digital signature is not secure and has presented a potential attack on the root extraction problem. The effectiveness of generic attacks on solving this problem for braids is still uncertain and it is unknown if it is possible to create braids that require exponential time to solve these problems. In 2023, Lin and al. has proposed a post-quantum signature scheme similar to the Wang-Hu scheme that is proven to be able to withstand attacks from quantum computers. However, evidence is presented here for the existence of an algorithm based on mean-set attacks that can recover the private key in both schemes without solving the root extraction problem. In the post-quantum signature version, we prove that the attacker can forge a signature passing the verification without recovering the private key

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
CryptanalysisBraid Group-based CryptographySignature SchemeMean-set Attackpost-quantum cryptography
Contact author(s)
sidoine djimnaibeye @ ucad edu sn
wambastonn @ gmail com
abiodounkpevi @ gmail com
tieudjo @ yahoo com
djiby sow @ ucad edu sn
History
2024-07-25: revised
2024-04-17: received
See all versions
Short URL
https://ia.cr/2024/596
License
Creative Commons Attribution-NonCommercial
CC BY-NC

BibTeX

@misc{cryptoeprint:2024/596,
      author = {Djimnaibeye Sidoine and Guy Mobouale Wamba and Abiodoun Clement Hounkpevi and Tieudjo Daniel and Djiby Sow},
      title = {Cryptanalysis of  signature schemes based on the root extraction problem over braid group},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/596},
      year = {2024},
      url = {https://eprint.iacr.org/2024/596}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.