首页> 外文会议>IMA conference on cryptography and coding >Lattice Attacks on Pairing-Based Signatures
【24h】

Lattice Attacks on Pairing-Based Signatures

机译:基于配对签名的格攻击

获取原文

摘要

Practical implementations of cryptosystems often suffer from critical information leakage through side-channels (such as their power consumption or their electromagnetic emanations). For public-key cryptography on embedded systems, the core operation is usually group exponentiation - or scalar multiplication on elliptic curves - which is a sequence of group operations derived from the private-key that may reveal secret bits to an attacker (on an unprotected implementation). We present lattice-based polynomial-time (heuristic) algorithms that recover the signer's secret in popular pairing-based signatures when used to sign several messages under the assumption that blocks of consecutive bits of the corresponding exponents are known by the attacker. Our techniques relies upon Coppersmith method and apply to all signatures in the so-called exponent-inversion framework in the standard security model (i.e. Boneh-Boyen and Gentry signatures) as well as in the random oracle model (i.e. Sakai-Kasahara signatures).
机译:密码系统的实际实现通常会遭受通过边道泄漏的关键信息(例如其功耗或电磁辐射)。对于嵌入式系统上的公钥密码术,核心操作通常是组幂运算-或椭圆曲线上的标量乘法-这是从私钥派生的一系列组操作,可能会向攻击者透露秘密位(在不受保护的实现中) )。我们提出了基于格的多项式时间(启发式)算法,该算法在攻击者已知相应指数的连续位块的假设下,用于对多个消息进行签名时,可以恢复流行的基于配对的签名中签名者的秘密。我们的技术依赖于Coppersmith方法,并适用于标准安全模型(即Boneh-Boyen和Gentry签名)以及随机oracle模型(即Sakai-Kasahara签名)中所谓的指数反转框架中的所有签名。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号