Vulnerable Public Keys in NTRU Cryptosystem
Liqing Xu , Hao Chen , Chao Li , Longjiang Qu
Chinese Annals of Mathematics, Series B ›› 2020, Vol. 41 ›› Issue (5) : 657 -664.
In this paper the authors give an efficient bounded distance decoding (BDD for short) algorithm for NTRU lattices under some conditions about the modulus number q and the public key h. They then use this algorithm to give plain-text recovery attack to NTRU Encrypt and forgery attack on NTRU Sign. In particular the authors figure out a weak domain of public keys such that the recent transcript secure version of NTRU signature scheme NTRUMLS with public keys in this domain can be forged.
Lattice / CVP / NTRU Lattice
| [1] |
Ajtai, M., The shortest vector problem in L 2 is NP-hard for randomized reduction, STOC, 1998, 10–19. |
| [2] |
Albrecht, M. R., Shi, B. and Ducas, L., A subfield lattice attack on overstreched NTRU assumption cryptanalysis of some FHE and graded encoding schemes, Crytpology ePrint Archive, https://eprint.iacr.org/2016/127. |
| [3] |
|
| [4] |
|
| [5] |
Chen, Y. and Nguyen, P. Q., BKZ2.0: Better lattice security estimates, Asiacrypt 2011, Lecture Notes in Computer Science 7073, 1–20, http://www.di.ens.fr/ychen/research/. |
| [6] |
Ducas, L. and Nguyen, P. Q., Learning a zonotope and more: Cryptanalysis of NTRUSign countermeasuresm, Asiacrypt 2012, Lecture Notes in Computer Science 765, 433–450. |
| [7] |
Gentry, C. and Szydlo, M., Cryptanlysis of revised NTRU signature scheme, Eurocrypt 2002, Lecture Notes in Computer Science 2332, 299–320. |
| [8] |
|
| [9] |
Hoffstein, J., Pipher, J., Schanck, J. M., et al., Transcript secure signatures based on modular lattices, version 2, https://eprint.iacr.org/2014/457. DOI: https://doi.org/10.1007/1978-3-642-02295-1-11 |
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
Nguyen, P. Q. and Regev, Q., Learning a parallelpiped: Cryptanalysis of GGH and NTRU signatures, Eurocrytp 2006, Lecture Notes in Computer Science 4004, 215–233. |
| [14] |
|
| [15] |
|
| [16] |
Stehlé, D. and Steinfeld, R., Making NTRU Encrypt and NTRU Sign as secure as standard worst-case problems over ideal lattices, Eurocrypt 2011, Lecture Notes in Computer Science 6632, 24–47. |
/
| 〈 |
|
〉 |