JAIST Repository >
b. 情報科学研究科・情報科学系 >
b10. 学術雑誌論文等 >
b10-1. 雑誌掲載論文 >

このアイテムの引用には次の識別子を使用してください: http://hdl.handle.net/10119/17028

タイトル: An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks
著者: Muroi, Akifumi
Okumura, Shinya
Miyaji, Atsuko
キーワード: IE-LWE problem
evaluation at one attack
closest vector problem
発行日: 2020-01-10
出版者: Springer
誌名: Lecture Notes in Computer Science
巻: 11959
開始ページ: 421
終了ページ: 436
DOI: 10.1007/978-3-030-38471-5_17
抄録: Akiyama, Goto, Okumura, Takagi, Nuida and Hanaoka introduced an indeterminate equation analogue of learning with errors (IE-LWE) problem as a new computationally hard problem and constructed a candidate of post-quantum cryptosystem, called “Giophantus”. Giophantus satisfies the indistinguishability under chosen plaintext attack (IND-CPA) if IE-LWE problem is computationally infeasible. Akiyama et al., Shimizu and Ikematsu proposed improved Giophantus to the post-quantum standardization project. Beullens, Castryck and Vercauteren proposed an evaluation at one attack against IND-CPA security of Giophantus. However, Akiyama et al. assert that recommended parameters can resist Vercauteren et al.’s attack. Therefore, the security analysis on Giophantus is still needed. In this paper, we propose a new kind of evaluation attack against IND-CPA security of Giophantus. Our attack solves IE-LWE problem by combining a part of Vercauteren et al.’s attack with a lattice attack on low rank lattices, e.g., 6-rank lattices for recommended parameters. Moreover, we investigate a way to avoid our attack and some variants of our attack. We give some remarks on modification of the IE-LWE problem. Our experimental analysis shows that our attack can solve IE-LWE problem efficiently, and that Giophantus does not satisfy IND-CPA security unless IE-LWE problem is modified appropriately.
Rights: This is the author-created version of Springer, Muroi A., Okumura S., Miyaji A. (2020) An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks. In: Paterson K., Stebila D. (eds) Selected Areas in Cryptography – SAC 2019. SAC 2019. Lecture Notes in Computer Science, vol 11959. The original publication is available at www.springerlink.com, http://dx.doi.org/10.1007/978-3-030-38471-5_17
URI: http://hdl.handle.net/10119/17028
資料タイプ: author
出現コレクション:b10-1. 雑誌掲載論文 (Journal Articles)

このアイテムのファイル:

ファイル 記述 サイズ形式
SAC2019-teamFE.pdf127KbAdobe PDF見る/開く

当システムに保管されているアイテムはすべて著作権により保護されています。

 


お問い合わせ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係