Vulnerable Public Keys in NTRU Cryptosystem
Liqing Xu , Hao Chen , Chao Li , Longjiang Qu
Chinese Annals of Mathematics, Series B ›› 2020, Vol. 41 ›› Issue (5) : 657 -664.
Vulnerable Public Keys in NTRU Cryptosystem
In this paper the authors give an efficient bounded distance decoding (BDD for short) algorithm for NTRU lattices under some conditions about the modulus number q and the public key h. They then use this algorithm to give plain-text recovery attack to NTRU Encrypt and forgery attack on NTRU Sign. In particular the authors figure out a weak domain of public keys such that the recent transcript secure version of NTRU signature scheme NTRUMLS with public keys in this domain can be forged.
Lattice / CVP / NTRU Lattice
| [1] |
Ajtai, M., The shortest vector problem in L 2 is NP-hard for randomized reduction, STOC, 1998, 10–19. |
| [2] |
Albrecht, M. R., Shi, B. and Ducas, L., A subfield lattice attack on overstreched NTRU assumption cryptanalysis of some FHE and graded encoding schemes, Crytpology ePrint Archive, https://eprint.iacr.org/2016/127. |
| [3] |
|
| [4] |
|
| [5] |
Chen, Y. and Nguyen, P. Q., BKZ2.0: Better lattice security estimates, Asiacrypt 2011, Lecture Notes in Computer Science 7073, 1–20, http://www.di.ens.fr/ychen/research/. |
| [6] |
Ducas, L. and Nguyen, P. Q., Learning a zonotope and more: Cryptanalysis of NTRUSign countermeasuresm, Asiacrypt 2012, Lecture Notes in Computer Science 765, 433–450. |
| [7] |
Gentry, C. and Szydlo, M., Cryptanlysis of revised NTRU signature scheme, Eurocrypt 2002, Lecture Notes in Computer Science 2332, 299–320. |
| [8] |
|
| [9] |
Hoffstein, J., Pipher, J., Schanck, J. M., et al., Transcript secure signatures based on modular lattices, version 2, https://eprint.iacr.org/2014/457. DOI: https://doi.org/10.1007/1978-3-642-02295-1-11 |
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
Nguyen, P. Q. and Regev, Q., Learning a parallelpiped: Cryptanalysis of GGH and NTRU signatures, Eurocrytp 2006, Lecture Notes in Computer Science 4004, 215–233. |
| [14] |
|
| [15] |
|
| [16] |
Stehlé, D. and Steinfeld, R., Making NTRU Encrypt and NTRU Sign as secure as standard worst-case problems over ideal lattices, Eurocrypt 2011, Lecture Notes in Computer Science 6632, 24–47. |
/
| 〈 |
|
〉 |