首页 > 最新文献

Journal of Mathematical Cryptology最新文献

英文 中文
DLP in semigroups: Algorithms and lower bounds 半群中的DLP:算法和下界
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2021-0049
Jiao Han, Jincheng Zhuang
Abstract The discrete logarithm problem (DLP) in semigroups has attracted some interests and serves as the foundation of many cryptographic schemes. In this work, we study algorithms and lower bounds for DLP in semigroups. First, we propose a variant of the deterministic algorithm for solving the cycle length of torsion elements and show the lower bound of computing the DLP in a semigroup. Then, we propose an algorithm for solving the multiple discrete logarithm (MDL) problem in the semigroup and give the lower bound for solving the MDL problem by considering the MDL problem in the generic semigroup model. Besides, we solve the multidimensional DLP and product DLP in the semigroup.
摘要半群中的离散对数问题(DLP)引起了人们的兴趣,并成为许多密码方案的基础。在这项工作中,我们研究了半群中DLP的算法和下界。首先,我们提出了求解扭转单元循环长度的确定性算法的一个变体,并给出了半群中DLP的计算下界。然后,我们提出了一种求解半群中多重离散对数(MDL)问题的算法,并通过考虑一般半群模型中的MDL问题给出了求解MDL问题的下界。此外,我们还求解了半群中的多维DLP和乘积DLP。
{"title":"DLP in semigroups: Algorithms and lower bounds","authors":"Jiao Han, Jincheng Zhuang","doi":"10.1515/jmc-2021-0049","DOIUrl":"https://doi.org/10.1515/jmc-2021-0049","url":null,"abstract":"Abstract The discrete logarithm problem (DLP) in semigroups has attracted some interests and serves as the foundation of many cryptographic schemes. In this work, we study algorithms and lower bounds for DLP in semigroups. First, we propose a variant of the deterministic algorithm for solving the cycle length of torsion elements and show the lower bound of computing the DLP in a semigroup. Then, we propose an algorithm for solving the multiple discrete logarithm (MDL) problem in the semigroup and give the lower bound for solving the MDL problem by considering the MDL problem in the generic semigroup model. Besides, we solve the multidimensional DLP and product DLP in the semigroup.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"278 - 288"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46189954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The mF mode of authenticated encryption with associated data 使用关联数据进行身份验证加密的mF模式
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2020-0054
Bishwajit Chakraborty, M. Nandi
Abstract In recent years, the demand for lightweight cryptographic protocols has grown immensely. To fulfill this necessity, the National Institute of Standards and Technology (NIST) has initiated a standardization process for lightweight cryptographic encryption. NIST’s call for proposal demands that the scheme should have one primary member that has a key length of 128 bits, and it should be secure up to 2 50 − 1 {2}^{50}-1 byte queries and 2 112 {2}^{112} computations. In this article, we propose a tweakable block cipher (TBC)-based authenticated encryption with associated data (AEAD) scheme, which we call mF {mathsf{mF}} . We provide authenticated encryption security analysis for mF {mathsf{mF}} under some weaker security assumptions (stated in the article) on the underlying TBC. We instantiate a TBC using block cipher and show that the TBC achieves these weaker securities, provided the key update function has high periodicity. mixFeed {mathsf{mixFeed}} is a round 2 candidate in the aforementioned lightweight cryptographic standardization competition. When we replace the key update function with the key scheduling function of Advanced Encryption Standard (AES), the mF {mathsf{mF}} mode reduces to mixFeed {mathsf{mixFeed}} . Recently, the low periodicity of AES key schedule is shown. Exploiting this feature, a practical attack on mixFeed {mathsf{mixFeed}} is reported. We have shown that multiplication by primitive element satisfies the high periodicity property, and we have a secure instantiation of mF {mathsf{mF}} , a secure variant of mixFeed {mathsf{mixFeed}} .
摘要近年来,对轻量级密码协议的需求急剧增长。为了满足这一必要性,美国国家标准与技术研究所(NIST)启动了轻量级加密的标准化过程。NIST的提案要求该方案应具有一个密钥长度为128位的主要成员,并且其安全性应高达2 50−1{2}^{50}-1字节查询和2112{2}^{112}计算。在本文中,我们提出了一种基于可调整分组密码(TBC)的关联数据认证加密(AEAD)方案,我们称之为mF{mathsf{mF}}。我们在底层TBC上的一些较弱的安全假设(如文章所述)下,为mF{mathsf{mF}}提供了经过身份验证的加密安全分析。我们使用分组密码实例化了一个TBC,并表明只要密钥更新函数具有高周期性,TBC就可以实现这些较弱的安全性。mixFeed{mathsf{mixFeed}}是上述轻量级加密标准化竞赛的第二轮候选。当我们用高级加密标准(AES)的密钥调度功能替换密钥更新功能时,mF{mathsf{mF}}模式简化为mixFeed{math sf{mixFeed}}。近年来,AES密钥调度的周期性较低。据报道,利用此功能对mixFeed进行了实际攻击。我们已经证明了通过基元的乘法满足高周期性性质,并且我们有一个mF{mathsf{mF}}的安全实例化,它是mixFeed的安全变体。
{"title":"The mF mode of authenticated encryption with associated data","authors":"Bishwajit Chakraborty, M. Nandi","doi":"10.1515/jmc-2020-0054","DOIUrl":"https://doi.org/10.1515/jmc-2020-0054","url":null,"abstract":"Abstract In recent years, the demand for lightweight cryptographic protocols has grown immensely. To fulfill this necessity, the National Institute of Standards and Technology (NIST) has initiated a standardization process for lightweight cryptographic encryption. NIST’s call for proposal demands that the scheme should have one primary member that has a key length of 128 bits, and it should be secure up to 2 50 − 1 {2}^{50}-1 byte queries and 2 112 {2}^{112} computations. In this article, we propose a tweakable block cipher (TBC)-based authenticated encryption with associated data (AEAD) scheme, which we call mF {mathsf{mF}} . We provide authenticated encryption security analysis for mF {mathsf{mF}} under some weaker security assumptions (stated in the article) on the underlying TBC. We instantiate a TBC using block cipher and show that the TBC achieves these weaker securities, provided the key update function has high periodicity. mixFeed {mathsf{mixFeed}} is a round 2 candidate in the aforementioned lightweight cryptographic standardization competition. When we replace the key update function with the key scheduling function of Advanced Encryption Standard (AES), the mF {mathsf{mF}} mode reduces to mixFeed {mathsf{mixFeed}} . Recently, the low periodicity of AES key schedule is shown. Exploiting this feature, a practical attack on mixFeed {mathsf{mixFeed}} is reported. We have shown that multiplication by primitive element satisfies the high periodicity property, and we have a secure instantiation of mF {mathsf{mF}} , a secure variant of mixFeed {mathsf{mixFeed}} .","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"73 - 97"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48034522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pseudo-free families and cryptographic primitives 伪自由族和密码原语
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2020-0055
M. Anokhin
Abstract In this article, we study the connections between pseudo-free families of computational Ω Omega -algebras (in appropriate varieties of Ω Omega -algebras for suitable finite sets Ω Omega of finitary operation symbols) and certain standard cryptographic primitives. We restrict ourselves to families ( H d ∣ d ∈ D ) left({H}_{d}hspace{0.33em}| hspace{0.33em}din D) of computational Ω Omega -algebras (where D ⊆ { 0 , 1 } ∗ Dsubseteq {left{0,1right}}^{ast } ) such that for every d ∈ D din D , each element of H d {H}_{d} is represented by a unique bit string of the length polynomial in the length of d d . Very loosely speaking, our main results are as follows: (i) pseudo-free families of computational mono-unary algebras with one to one fundamental operation (in the variety of all mono-unary algebras) exist if and only if one-way families of permutations exist; (ii) for any m ≥ 2 mge 2 , pseudo-free families of computational m m -unary algebras with one to one fundamental operations (in the variety of all m m -unary algebras) exist if and only if claw resistant families of m m -tuples of permutations exist; (iii) for a certain Ω Omega and a certain variety V {mathfrak{V}} of Ω Omega -algebras, the existence of pseudo-free families of computational Ω Omega -algebras in V {mathfrak{V}} implies the existence of families of trapdoor permutations.
摘要在本文中,我们研究了计算ΩOmega-代数的伪自由族(在有限运算符号的适当有限集ΩOmega-代数的适当变体中)与某些标准密码基元之间的联系。我们把自己限制在族(H dŞd∈d)left({H}_{d} hspace{0.33em}| hspace{0.33em}d在D中),使得对于D中的每个D∈D,H的每个元素{H}_{d} 由长度为d d的长度多项式的唯一比特串表示。非常松散地说,我们的主要结果如下:(i)具有一对一基本运算的计算一元代数的伪自由族(在所有一元代数中)存在当且仅当单向置换族存在;(ii)对于任意m≥2mge2,具有一对一基本运算的计算m-一元代数的伪自由族(在所有m-一元代数的变种中)存在当且仅当置换的m-元组的抗爪族存在;(iii)对于ΩOmega代数的某个ΩOmega和某个变种V{mathfrak{V}},V{ mathfrak{V}}中计算ΩOmega-代数的伪自由族的存在暗示了陷门置换族的存在。
{"title":"Pseudo-free families and cryptographic primitives","authors":"M. Anokhin","doi":"10.1515/jmc-2020-0055","DOIUrl":"https://doi.org/10.1515/jmc-2020-0055","url":null,"abstract":"Abstract In this article, we study the connections between pseudo-free families of computational Ω Omega -algebras (in appropriate varieties of Ω Omega -algebras for suitable finite sets Ω Omega of finitary operation symbols) and certain standard cryptographic primitives. We restrict ourselves to families ( H d ∣ d ∈ D ) left({H}_{d}hspace{0.33em}| hspace{0.33em}din D) of computational Ω Omega -algebras (where D ⊆ { 0 , 1 } ∗ Dsubseteq {left{0,1right}}^{ast } ) such that for every d ∈ D din D , each element of H d {H}_{d} is represented by a unique bit string of the length polynomial in the length of d d . Very loosely speaking, our main results are as follows: (i) pseudo-free families of computational mono-unary algebras with one to one fundamental operation (in the variety of all mono-unary algebras) exist if and only if one-way families of permutations exist; (ii) for any m ≥ 2 mge 2 , pseudo-free families of computational m m -unary algebras with one to one fundamental operations (in the variety of all m m -unary algebras) exist if and only if claw resistant families of m m -tuples of permutations exist; (iii) for a certain Ω Omega and a certain variety V {mathfrak{V}} of Ω Omega -algebras, the existence of pseudo-free families of computational Ω Omega -algebras in V {mathfrak{V}} implies the existence of families of trapdoor permutations.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"114 - 140"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44040424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of automorphic forms to lattice problems 自同构形式在格问题中的应用
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2021-0045
Samed Düzlü, Julian Krämer
Abstract In this article, we propose a new approach to the study of lattice problems used in cryptography. We specifically focus on module lattices of a fixed rank over some number field. An essential question is the hardness of certain computational problems on such module lattices, as the additional structure may allow exploitation. The fundamental insight is the fact that the collection of those lattices are quotients of algebraic manifolds by arithmetic subgroups. Functions in these spaces are studied in mathematics as part of the number theory. In particular, those form a module over the Hecke algebra associated with the general linear group. We use results on these function spaces to define a class of distributions on the space of lattices. Using the Hecke algebra, we define Hecke operators associated with collections of prime ideals of the number field and show a criterion on distributions to converge to the uniform distribution, if the Hecke operators are applied to the chosen distribution. Our approach is motivated by the work of de Boer, Ducas, Pellet-Mary, and Wesolowski (CRYPTO’20) on self-reduction of ideal lattices via Arakelov divisors.
摘要在本文中,我们提出了一种研究密码学中使用的格问题的新方法。我们特别关注某个数域上固定秩的模格。一个重要的问题是这种模格上某些计算问题的硬度,因为额外的结构可能允许开发。基本的见解是,这些格的集合是算术子群的代数流形的商。作为数论的一部分,这些空间中的函数在数学中被研究。特别地,它们在与一般线性群相关的赫克代数上形成一个模。我们使用这些函数空间上的结果来定义格空间上的一类分布。使用Hecke代数,我们定义了与数域的素数理想集合相关的Hecke算子,并给出了一个关于分布收敛到均匀分布的准则,如果Hecke运算符应用于所选分布。我们的方法是由de Boer、Ducas、Pellet-Mary和Wesolowski(CRYPTO'20)关于通过Arakelov除数的理想格的自约简的工作所推动的。
{"title":"Application of automorphic forms to lattice problems","authors":"Samed Düzlü, Julian Krämer","doi":"10.1515/jmc-2021-0045","DOIUrl":"https://doi.org/10.1515/jmc-2021-0045","url":null,"abstract":"Abstract In this article, we propose a new approach to the study of lattice problems used in cryptography. We specifically focus on module lattices of a fixed rank over some number field. An essential question is the hardness of certain computational problems on such module lattices, as the additional structure may allow exploitation. The fundamental insight is the fact that the collection of those lattices are quotients of algebraic manifolds by arithmetic subgroups. Functions in these spaces are studied in mathematics as part of the number theory. In particular, those form a module over the Hecke algebra associated with the general linear group. We use results on these function spaces to define a class of distributions on the space of lattices. Using the Hecke algebra, we define Hecke operators associated with collections of prime ideals of the number field and show a criterion on distributions to converge to the uniform distribution, if the Hecke operators are applied to the chosen distribution. Our approach is motivated by the work of de Boer, Ducas, Pellet-Mary, and Wesolowski (CRYPTO’20) on self-reduction of ideal lattices via Arakelov divisors.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"156 - 197"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46348820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting 从输出中恢复整数多项式及其在安全排序协议密码分析中的应用
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2021-0054
S. Vivek, Shyam Murthy, D. Kumaraswamy
Abstract We investigate the problem of recovering integer inputs (up to an affine scaling) when given only the integer monotonic polynomial outputs. Given n n integer outputs of a degree- d d integer monotonic polynomial whose coefficients and inputs are integers within known bounds and n ≫ d ngg d , we give an algorithm to recover the polynomial and the integer inputs (up to an affine scaling). A heuristic expected time complexity analysis of our method shows that it is exponential in the size of the degree of the polynomial but polynomial in the size of the polynomial coefficients. We conduct experiments with real-world data as well as randomly chosen parameters and demonstrate the effectiveness of our algorithm over a wide range of parameters. Using only the polynomial evaluations at specific integer points, the apparent hardness of recovering the input data served as the basis of security of a recent protocol proposed by Kesarwani et al. for secure k k -nearest neighbor computation on encrypted data that involved secure sorting. The protocol uses the outputs of randomly chosen monotonic integer polynomial to hide its inputs except to only reveal the ordering of input data. By using our integer polynomial recovery algorithm, we show that we can recover the polynomial and the inputs within a few seconds, thereby demonstrating an attack on the protocol of Kesarwani et al.
摘要我们研究了当只给定整数单调多项式输出时,恢复整数输入(直到仿射标度)的问题。给定一个系数和输入都是已知界内整数的次数-d d整数单调多项式的n n个整数输出和n d ngg d,我们给出了一个恢复多项式和整数输入(直到仿射缩放)的算法。我们的方法的启发式期望时间复杂性分析表明,它在多项式的次数大小上是指数的,但在多项式系数的大小上是多项式的。我们用真实世界的数据以及随机选择的参数进行了实验,并在广泛的参数范围内证明了我们算法的有效性。仅使用特定整数点上的多项式评估,恢复输入数据的表观硬度是Kesarwani等人最近提出的一个协议的安全性基础。该协议用于对涉及安全排序的加密数据进行安全的k k-最近邻计算。该协议使用随机选择的单调整数多项式的输出来隐藏其输入,除了只显示输入数据的顺序。通过使用我们的整数多项式恢复算法,我们证明了我们可以在几秒内恢复多项式和输入,从而证明了对Kesarwani等人的协议的攻击。
{"title":"Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting","authors":"S. Vivek, Shyam Murthy, D. Kumaraswamy","doi":"10.1515/jmc-2021-0054","DOIUrl":"https://doi.org/10.1515/jmc-2021-0054","url":null,"abstract":"Abstract We investigate the problem of recovering integer inputs (up to an affine scaling) when given only the integer monotonic polynomial outputs. Given n n integer outputs of a degree- d d integer monotonic polynomial whose coefficients and inputs are integers within known bounds and n ≫ d ngg d , we give an algorithm to recover the polynomial and the integer inputs (up to an affine scaling). A heuristic expected time complexity analysis of our method shows that it is exponential in the size of the degree of the polynomial but polynomial in the size of the polynomial coefficients. We conduct experiments with real-world data as well as randomly chosen parameters and demonstrate the effectiveness of our algorithm over a wide range of parameters. Using only the polynomial evaluations at specific integer points, the apparent hardness of recovering the input data served as the basis of security of a recent protocol proposed by Kesarwani et al. for secure k k -nearest neighbor computation on encrypted data that involved secure sorting. The protocol uses the outputs of randomly chosen monotonic integer polynomial to hide its inputs except to only reveal the ordering of input data. By using our integer polynomial recovery algorithm, we show that we can recover the polynomial and the inputs within a few seconds, thereby demonstrating an attack on the protocol of Kesarwani et al.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"251 - 277"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44952054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme 受Lindner–Peikert方案启发的基于Ring LWE的数字签名
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/jmc-2021-0013
J. Sharafi, H. Daghigh
Abstract In this article, we give a digital signature by using Lindner–Peikert cryptosystem. The security of this digital signature is based on the assumptions about hardness of Ring-LWE and Ring-SIS problems, along with providing public key and signature of compact (1–1.5 kilobytes) size. We prove the security of our signature scheme in the Quantum Random Oracle Model. Our cryptanalysis has been done based on methods of Aggarwal et al. and Chen et al.
摘要本文利用Lindner-Peikert密码系统给出了一个数字签名。该数字签名的安全性基于对Ring-LWE和Ring-SIS问题硬度的假设,并提供紧凑(1-1.5 kb)大小的公钥和签名。在量子随机Oracle模型中证明了签名方案的安全性。我们的密码分析是基于Aggarwal等人和Chen等人的方法完成的。
{"title":"A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme","authors":"J. Sharafi, H. Daghigh","doi":"10.1515/jmc-2021-0013","DOIUrl":"https://doi.org/10.1515/jmc-2021-0013","url":null,"abstract":"Abstract In this article, we give a digital signature by using Lindner–Peikert cryptosystem. The security of this digital signature is based on the assumptions about hardness of Ring-LWE and Ring-SIS problems, along with providing public key and signature of compact (1–1.5 kilobytes) size. We prove the security of our signature scheme in the Quantum Random Oracle Model. Our cryptanalysis has been done based on methods of Aggarwal et al. and Chen et al.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"205 - 214"},"PeriodicalIF":1.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44959316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A code-based hybrid signcryption scheme 基于代码的混合签名加密方案
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-12-14 DOI: 10.36227/techrxiv.17283899.v1
Jean Belo Klamti, M. Hasan
Abstract A key encapsulation mechanism ( KEM {mathsf{KEM}} ) that takes as input an arbitrary string, i.e., a tag, is known as tag- KEM {mathsf{KEM}} , while a scheme that combines signature and encryption is called signcryption. In this article, we present a code-based signcryption tag- KEM {mathsf{KEM}} scheme. We utilize a code-based signature and an IND - CCA2 {mathsf{IND}}hspace{0.1em}text{-}hspace{0.1em}{mathsf{CCA2}} (adaptive chosen ciphertext attack) secure version of McEliece’s encryption scheme. The proposed scheme uses an equivalent subcode as a public code for the receiver, making the NP-completeness of the subcode equivalence problem be one of our main security assumptions. We then base the signcryption tag- KEM {mathsf{KEM}} to design a code-based hybrid signcryption scheme. A hybrid scheme deploys asymmetric- as well as symmetric-key encryption. We give security analyses of both our schemes in the standard model and prove that they are secure against IND - CCA2 {mathsf{IND}}hspace{0.1em}text{-}hspace{0.1em}{mathsf{CCA2}} (indistinguishability under adaptive chosen ciphertext attack) and SUF - CMA {mathsf{SUF}}hspace{0.1em}text{-}hspace{0.1em}{mathsf{CMA}} (strong existential unforgeability under chosen message attack).
摘要一种将任意字符串(即标签)作为输入的密钥封装机制(KEM{mathsf{KEM})被称为标签-KEM{math sf{GEM}},而将签名和加密相结合的方案被称为签密。在本文中,我们提出了一种基于代码的签密标签-KEM{mathsf{KEM}}方案。我们使用了基于代码的签名和McEliece加密方案的IND-CCA2{mathsf{IND}}space{0.1em}text{-}sface{0.1em}{math sf{CCA2}}}(自适应选择密文攻击)安全版本。所提出的方案使用等价子码作为接收器的公共码,使得子码等价问题的NP完全性成为我们的主要安全假设之一。然后,我们基于签密标签-KEM{mathsf{KEM}}来设计基于代码的混合签密方案。混合方案部署非对称和对称密钥加密。我们在标准模型中对我们的两个方案进行了安全性分析,并证明了它们对IND-CCA2{mathsf{IND}}hspace{0.1em}text{-}space{0.1em}{math sf{CCA2}}}(自适应选择密文攻击下的不可区分性)和SUF-CMA{ mathsf{SUF}}。
{"title":"A code-based hybrid signcryption scheme","authors":"Jean Belo Klamti, M. Hasan","doi":"10.36227/techrxiv.17283899.v1","DOIUrl":"https://doi.org/10.36227/techrxiv.17283899.v1","url":null,"abstract":"Abstract A key encapsulation mechanism ( KEM {mathsf{KEM}} ) that takes as input an arbitrary string, i.e., a tag, is known as tag- KEM {mathsf{KEM}} , while a scheme that combines signature and encryption is called signcryption. In this article, we present a code-based signcryption tag- KEM {mathsf{KEM}} scheme. We utilize a code-based signature and an IND - CCA2 {mathsf{IND}}hspace{0.1em}text{-}hspace{0.1em}{mathsf{CCA2}} (adaptive chosen ciphertext attack) secure version of McEliece’s encryption scheme. The proposed scheme uses an equivalent subcode as a public code for the receiver, making the NP-completeness of the subcode equivalence problem be one of our main security assumptions. We then base the signcryption tag- KEM {mathsf{KEM}} to design a code-based hybrid signcryption scheme. A hybrid scheme deploys asymmetric- as well as symmetric-key encryption. We give security analyses of both our schemes in the standard model and prove that they are secure against IND - CCA2 {mathsf{IND}}hspace{0.1em}text{-}hspace{0.1em}{mathsf{CCA2}} (indistinguishability under adaptive chosen ciphertext attack) and SUF - CMA {mathsf{SUF}}hspace{0.1em}text{-}hspace{0.1em}{mathsf{CMA}} (strong existential unforgeability under chosen message attack).","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"17 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43908328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the efficiency of a general attack against the MOBS cryptosystem 关于对MOBS密码系统的一般攻击的有效性
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-11-10 DOI: 10.1515/jmc-2021-0050
Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, S. F. Shahandashti
Abstract All instances of the semidirect key exchange protocol, a generalisation of the famous Diffie-Hellman key exchange protocol, satisfy the so-called telescoping equality; in some cases, this equality has been used to construct an attack. In this report, we present computational evidence suggesting that an instance of the scheme called “MOBS (matrices over bitstrings)” is an example of a scheme where the telescoping equality has too many solutions to be a practically viable means to conduct an attack.
摘要半直接密钥交换协议是著名的Diffie-Hellman密钥交换协议的推广,它的所有实例都满足所谓的伸缩等式;在某些情况下,这个等式被用来构造攻击。在本报告中,我们提供了计算证据,表明一个名为“MOBS(比特串上的矩阵)”的方案实例是一个方案的例子,其中伸缩等式有太多的解决方案,无法成为实施攻击的实际可行手段。
{"title":"On the efficiency of a general attack against the MOBS cryptosystem","authors":"Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, S. F. Shahandashti","doi":"10.1515/jmc-2021-0050","DOIUrl":"https://doi.org/10.1515/jmc-2021-0050","url":null,"abstract":"Abstract All instances of the semidirect key exchange protocol, a generalisation of the famous Diffie-Hellman key exchange protocol, satisfy the so-called telescoping equality; in some cases, this equality has been used to construct an attack. In this report, we present computational evidence suggesting that an instance of the scheme called “MOBS (matrices over bitstrings)” is an example of a scheme where the telescoping equality has too many solutions to be a practically viable means to conduct an attack.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"289 - 297"},"PeriodicalIF":1.2,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49440738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the confusion coefficient of Boolean functions 关于布尔函数的混淆系数
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-08-05 DOI: 10.1515/jmc-2021-0012
Yu Zhou, Jianyong Hu, Xudong Miao, Yu Han, Fuzhong Zhang
Abstract The notion of the confusion coefficient is a property that attempts to characterize confusion property of cryptographic algorithms against differential power analysis. In this article, we establish a relationship between the confusion coefficient and the autocorrelation function for any Boolean function and give a tight upper bound and a tight lower bound on the confusion coefficient for any (balanced) Boolean function. We also deduce some deep relationships between the sum-of-squares of the confusion coefficient and other cryptographic indicators (the sum-of-squares indicator, hamming weight, algebraic immunity and correlation immunity), respectively. Moreover, we obtain some trade-offs among the sum-of-squares of the confusion coefficient, the signal-to-noise ratio and the redefined transparency order for a Boolean function.
摘要混淆系数的概念是一个性质,试图表征密码算法对差分幂分析的混淆性质。在本文中,我们建立了任何布尔函数的混淆系数和自相关函数之间的关系,并给出了任何(平衡的)布尔函数混淆系数的紧上界和紧下界。我们还分别推导了混淆系数的平方和与其他密码指标(平方和指标、hamming权、代数免疫和相关免疫)之间的一些深层关系。此外,我们还获得了布尔函数的混淆系数平方和、信噪比和重新定义的透明顺序之间的一些折衷。
{"title":"On the confusion coefficient of Boolean functions","authors":"Yu Zhou, Jianyong Hu, Xudong Miao, Yu Han, Fuzhong Zhang","doi":"10.1515/jmc-2021-0012","DOIUrl":"https://doi.org/10.1515/jmc-2021-0012","url":null,"abstract":"Abstract The notion of the confusion coefficient is a property that attempts to characterize confusion property of cryptographic algorithms against differential power analysis. In this article, we establish a relationship between the confusion coefficient and the autocorrelation function for any Boolean function and give a tight upper bound and a tight lower bound on the confusion coefficient for any (balanced) Boolean function. We also deduce some deep relationships between the sum-of-squares of the confusion coefficient and other cryptographic indicators (the sum-of-squares indicator, hamming weight, algebraic immunity and correlation immunity), respectively. Moreover, we obtain some trade-offs among the sum-of-squares of the confusion coefficient, the signal-to-noise ratio and the redefined transparency order for a Boolean function.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"1 - 13"},"PeriodicalIF":1.2,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43412352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A deterministic algorithm for the discrete logarithm problem in a semigroup 半群中离散对数问题的一种确定性算法
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-27 DOI: 10.1515/jmc-2021-0022
Simran Tinani, J. Rosenthal
Abstract The discrete logarithm problem (DLP) in a finite group is the basis for many protocols in cryptography. The best general algorithms which solve this problem have a time complexity of O ( N log N ) Oleft(sqrt{N}log N) and a space complexity of O ( N ) Oleft(sqrt{N}) , where N N is the order of the group. (If N N is unknown, a simple modification would achieve a time complexity of O ( N ( log N ) 2 ) Oleft(sqrt{N}{left(log N)}^{2}) .) These algorithms require the inversion of some group elements or rely on finding collisions and the existence of inverses, and thus do not adapt to work in the general semigroup setting. For semigroups, probabilistic algorithms with similar time complexity have been proposed. The main result of this article is a deterministic algorithm for solving the DLP in a semigroup. Specifically, let x x be an element in a semigroup having finite order N x {N}_{x} . The article provides an algorithm, which, given any element y ∈ ⟨ x ⟩ yin langle xrangle , provides all natural numbers m m with x m = y {x}^{m}=y , and has time complexity O ( N x ( log N x ) 2 ) Oleft(sqrt{{N}_{x}}{left(log {N}_{x})}^{2}) steps. The article also gives an analysis of the success rates of the existing probabilistic algorithms, which were so far only conjectured or stated loosely.
摘要有限群中的离散对数问题是密码学中许多协议的基础。解决这个问题的最佳通用算法的时间复杂度为O(N log N)Oleft(sqrt{N}log N),空间复杂度为0(N)O left(skrt{N}),其中N N是群的阶数。(如果N N是未知的,则一个简单的修改将实现O(N(log N)2)Oleft(sqrt{N}{left(log N)}^{2})的时间复杂度。)这些算法需要对某些群元素求逆,或者依赖于寻找碰撞和逆的存在,因此不适用于一般的半群设置。对于半群,已经提出了具有相似时间复杂度的概率算法。本文的主要结果是求解半群中DLP的一个确定性算法。具体地说,设x x是具有有限阶N x的半群中的一个元素{N}_{x} 。本文给出了一种算法,在给定任意元素y∈x⟩ylangle xlangle的情况下,它提供了所有自然数m m,其中x m=y{x}^{m}=y,并且具有时间复杂度O(N x(log N x)2)O left(sqrt{{N}_{x} }{left(log{N}_{x} )}^{2})步骤。文章还分析了现有概率算法的成功率,这些算法到目前为止只是猜测或松散地陈述。
{"title":"A deterministic algorithm for the discrete logarithm problem in a semigroup","authors":"Simran Tinani, J. Rosenthal","doi":"10.1515/jmc-2021-0022","DOIUrl":"https://doi.org/10.1515/jmc-2021-0022","url":null,"abstract":"Abstract The discrete logarithm problem (DLP) in a finite group is the basis for many protocols in cryptography. The best general algorithms which solve this problem have a time complexity of O ( N log N ) Oleft(sqrt{N}log N) and a space complexity of O ( N ) Oleft(sqrt{N}) , where N N is the order of the group. (If N N is unknown, a simple modification would achieve a time complexity of O ( N ( log N ) 2 ) Oleft(sqrt{N}{left(log N)}^{2}) .) These algorithms require the inversion of some group elements or rely on finding collisions and the existence of inverses, and thus do not adapt to work in the general semigroup setting. For semigroups, probabilistic algorithms with similar time complexity have been proposed. The main result of this article is a deterministic algorithm for solving the DLP in a semigroup. Specifically, let x x be an element in a semigroup having finite order N x {N}_{x} . The article provides an algorithm, which, given any element y ∈ ⟨ x ⟩ yin langle xrangle , provides all natural numbers m m with x m = y {x}^{m}=y , and has time complexity O ( N x ( log N x ) 2 ) Oleft(sqrt{{N}_{x}}{left(log {N}_{x})}^{2}) steps. The article also gives an analysis of the success rates of the existing probabilistic algorithms, which were so far only conjectured or stated loosely.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"141 - 155"},"PeriodicalIF":1.2,"publicationDate":"2021-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43508095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Mathematical Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1