Lattice Attacks on Pairing-Based Signatures - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2017

Lattice Attacks on Pairing-Based Signatures

Résumé

Practical implementations of cryptosystems often suffer from critical information leakage through side-channels (such as their power consumption or their electromagnetic emanations). For public-key cryptography on embedded systems, the core operation is usually group exponentiation – or scalar multiplication on elliptic curves – which is a sequence of group operations derived from the private-key that may reveal secret bits to an attacker (on an unprotected implementation). We present lattice-based polynomial-time (heuristic) algorithms that recover the signer’s secret in popular pairing-based signatures when used to sign several messages under the assumption that blocks of consecutive bits of the corresponding exponents are known by the attacker. Our techniques relies upon Coppersmith method and apply to all signatures in the so-called exponent-inversion framework in the standard security model (i.e. Boneh-Boyen and Gentry signatures) as well as in the random oracle model (i.e. Sakai-Kasahara signatures).
Fichier principal
Vignette du fichier
main.pdf (356.28 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01737064 , version 1 (13-05-2020)

Identifiants

Citer

Thierry Mefenza, Damien Vergnaud. Lattice Attacks on Pairing-Based Signatures. IMACC 2017 - 16th IMA International Conference on Cryptography and Coding, Dec 2017, Oxford, United Kingdom. pp.352-370, ⟨10.1007/978-3-319-71045-7_18⟩. ⟨hal-01737064⟩
192 Consultations
221 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More