首页 > 最新文献

Journal of Mathematical Cryptology最新文献

英文 中文
Isogenies on twisted Hessian curves. 扭曲Hessian曲线上的等同性。
IF 0.5 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/jmc-2020-0037
Fouazou Lontouo Perez, Thinh Dang, Emmanuel Fouotsa, Dustin Moody

Elliptic curves are typically defined by Weierstrass equations. Given a kernel, the well-known Vélu's formula shows how to explicitly write down an isogeny between Weierstrass curves. However, it is not clear how to do the same on other forms of elliptic curves without isomorphisms mapping to and from the Weierstrass form. Previous papers have shown some isogeny formulas for (twisted) Edwards, Huff, and Montgomery forms of elliptic curves. Continuing this line of work, this paper derives explicit formulas for isogenies between elliptic curves in (twisted) Hessian form. In addition, we examine the numbers of operations in the base field to compute the formulas. In comparison with other isogeny formulas, we note that our formulas for twisted Hessian curves have the lowest costs for processing the kernel and our X-affine formula has the lowest cost for processing an input point in affine coordinates.

椭圆曲线通常由魏尔斯特拉斯方程定义。给定一个核,著名的vsamulu公式显示了如何明确地写出Weierstrass曲线之间的等根。然而,如何在没有与weerstrass形式映射的同构的其他形式的椭圆曲线上做同样的事情尚不清楚。以前的论文已经给出了椭圆曲线(扭曲的)Edwards、Huff和Montgomery形式的等根公式。在此基础上,推导出(扭曲)Hessian形式椭圆曲线间等同源的显式公式。此外,我们还检查了基域中的操作数来计算公式。与其他同源公式相比,我们注意到我们的扭曲黑森曲线公式处理核的代价最低,而我们的x -仿射公式处理仿射坐标中的输入点的代价最低。
{"title":"Isogenies on twisted Hessian curves.","authors":"Fouazou Lontouo Perez, Thinh Dang, Emmanuel Fouotsa, Dustin Moody","doi":"10.1515/jmc-2020-0037","DOIUrl":"10.1515/jmc-2020-0037","url":null,"abstract":"<p><p>Elliptic curves are typically defined by Weierstrass equations. Given a kernel, the well-known Vélu's formula shows how to explicitly write down an isogeny between Weierstrass curves. However, it is not clear how to do the same on other forms of elliptic curves without isomorphisms mapping to and from the Weierstrass form. Previous papers have shown some isogeny formulas for (twisted) Edwards, Huff, and Montgomery forms of elliptic curves. Continuing this line of work, this paper derives explicit formulas for isogenies between elliptic curves in (twisted) Hessian form. In addition, we examine the numbers of operations in the base field to compute the formulas. In comparison with other isogeny formulas, we note that our formulas for twisted Hessian curves have the lowest costs for processing the kernel and our <i>X</i>-affine formula has the lowest cost for processing an input point in affine coordinates.</p>","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8314185/pdf/nihms-1714399.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39254343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revocable attribute-based proxy re-encryption 基于可撤销属性的代理重新加密
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/jmc-2020-0039
Fucai Luo, S. Al-Kuwari
Abstract Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into a ciphertext under another access policy, without revealing any information about the underlying plaintext. This primitive is very useful in applications where encrypted data need to be stored in untrusted environments, such as cloud storage. In many practical applications, and in order to address scenarios where users misbehave or the re-encryption keys are compromised, an efficient revocation mechanism is necessary for ABPRE. Previously, revocation mechanism was considered in the settings of identity-based encryption (IBE), ABE, predicate encryption (PE), and broadcast PRE, but not ABPRE, which is what we set to do in this paper. We first formalize the concept of revocable ABPRE and its security model. Then, we propose a lattice-based instantiation of revocable ABPRE. Our scheme not only supports an efficient revocation mechanism but also supports polynomial-depth policy circuits and has short private keys, where the size of the keys is dependent only on the depth of the supported policy circuits. In addition, we prove that our scheme is selectively chosen-plaintext attack (CPA) secure in the standard model, based on the learning with errors assumption.
摘要基于属性的代理再加密(ABPRE)结合了代理再加密和基于属性的加密的概念,允许具有再加密密钥的半可信代理将特定访问策略下的密文转换为另一访问策略下下的密文,而不会泄露任何有关底层明文的信息。此原语在加密数据需要存储在不可信环境(如云存储)中的应用程序中非常有用。在许多实际应用中,为了解决用户行为不端或重新加密密钥被泄露的情况,ABPRE需要一种有效的撤销机制。以前,在基于身份的加密(IBE)、ABE、谓词加密(PE)和广播PRE的设置中考虑了吊销机制,但没有考虑ABPRE,这是我们在本文中设置要做的。我们首先形式化了可撤销ABPRE的概念及其安全模型。然后,我们提出了一个基于格的可撤销ABPRE实例化。我们的方案不仅支持有效的撤销机制,而且支持多项式深度策略电路,并且具有短私钥,其中密钥的大小仅取决于支持的策略电路的深度。此外,基于带误差学习的假设,我们证明了我们的方案在标准模型中是选择性选择明文攻击(CPA)安全的。
{"title":"Revocable attribute-based proxy re-encryption","authors":"Fucai Luo, S. Al-Kuwari","doi":"10.1515/jmc-2020-0039","DOIUrl":"https://doi.org/10.1515/jmc-2020-0039","url":null,"abstract":"Abstract Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into a ciphertext under another access policy, without revealing any information about the underlying plaintext. This primitive is very useful in applications where encrypted data need to be stored in untrusted environments, such as cloud storage. In many practical applications, and in order to address scenarios where users misbehave or the re-encryption keys are compromised, an efficient revocation mechanism is necessary for ABPRE. Previously, revocation mechanism was considered in the settings of identity-based encryption (IBE), ABE, predicate encryption (PE), and broadcast PRE, but not ABPRE, which is what we set to do in this paper. We first formalize the concept of revocable ABPRE and its security model. Then, we propose a lattice-based instantiation of revocable ABPRE. Our scheme not only supports an efficient revocation mechanism but also supports polynomial-depth policy circuits and has short private keys, where the size of the keys is dependent only on the depth of the supported policy circuits. In addition, we prove that our scheme is selectively chosen-plaintext attack (CPA) secure in the standard model, based on the learning with errors assumption.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"465 - 482"},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49261995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sensitivities and block sensitivities of elementary symmetric Boolean functions 初等对称布尔函数的灵敏度和块灵敏度
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/jmc-2020-0042
Jing Zhang, Yuan Li, J. Adeyeye
Abstract Boolean functions have important applications in molecular regulatory networks, engineering, cryptography, information technology, and computer science. Symmetric Boolean functions have received a lot of attention in several decades. Sensitivity and block sensitivity are important complexity measures of Boolean functions. In this paper, we study the sensitivity of elementary symmetric Boolean functions and obtain many explicit formulas. We also obtain a formula for the block sensitivity of symmetric Boolean functions and discuss its applications in elementary symmetric Boolean functions.
摘要布尔函数在分子调控网络、工程、密码学、信息技术和计算机科学中有着重要的应用。近几十年来,对称布尔函数受到了广泛的关注。灵敏度和块灵敏度是布尔函数重要的复杂度度量。本文研究了初等对称布尔函数的敏感性,得到了许多显式公式。给出了对称布尔函数的块灵敏度公式,并讨论了其在初等对称布尔函数中的应用。
{"title":"Sensitivities and block sensitivities of elementary symmetric Boolean functions","authors":"Jing Zhang, Yuan Li, J. Adeyeye","doi":"10.1515/jmc-2020-0042","DOIUrl":"https://doi.org/10.1515/jmc-2020-0042","url":null,"abstract":"Abstract Boolean functions have important applications in molecular regulatory networks, engineering, cryptography, information technology, and computer science. Symmetric Boolean functions have received a lot of attention in several decades. Sensitivity and block sensitivity are important complexity measures of Boolean functions. In this paper, we study the sensitivity of elementary symmetric Boolean functions and obtain many explicit formulas. We also obtain a formula for the block sensitivity of symmetric Boolean functions and discuss its applications in elementary symmetric Boolean functions.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"434 - 453"},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0042","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42226461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs 计算一般离散对数和具有权衡的阶的量子算法
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/jmc-2020-0006
Martin Ekerå
Abstract We generalize our earlier works on computing short discrete logarithms with tradeoffs, and bridge them with Seifert's work on computing orders with tradeoffs, and with Shor's groundbreaking works on computing orders and general discrete logarithms. In particular, we enable tradeoffs when computing general discrete logarithms. Compared to Shor's algorithm, this yields a reduction by up to a factor of two in the number of group operations evaluated quantumly in each run, at the expense of having to perform multiple runs. Unlike Shor's algorithm, our algorithm does not require the group order to be known. It simultaneously computes both the order and the logarithm. We analyze the probability distributions induced by our algorithm, and by Shor's and Seifert's order-finding algorithms, describe how these algorithms may be simulated when the solution is known, and estimate the number of runs required for a given minimum success probability when making different tradeoffs.
摘要我们推广了我们早期关于计算具有权衡的短离散对数的工作,并将其与Seifert关于计算具有折衷的阶数的工作以及Shor关于计算阶数和一般离散对数的开创性工作联系起来。特别是,在计算一般离散对数时,我们可以进行权衡。与Shor的算法相比,这使得每次运行中定量评估的组操作数量减少了多达两倍,而代价是必须执行多次运行。与Shor的算法不同,我们的算法不需要知道群阶。它同时计算阶数和对数。我们分析了由我们的算法以及Shor和Seifert的订单查找算法引起的概率分布,描述了在已知解决方案时如何模拟这些算法,并估计了在进行不同权衡时给定最小成功概率所需的运行次数。
{"title":"Quantum algorithms for computing general discrete logarithms and orders with tradeoffs","authors":"Martin Ekerå","doi":"10.1515/jmc-2020-0006","DOIUrl":"https://doi.org/10.1515/jmc-2020-0006","url":null,"abstract":"Abstract We generalize our earlier works on computing short discrete logarithms with tradeoffs, and bridge them with Seifert's work on computing orders with tradeoffs, and with Shor's groundbreaking works on computing orders and general discrete logarithms. In particular, we enable tradeoffs when computing general discrete logarithms. Compared to Shor's algorithm, this yields a reduction by up to a factor of two in the number of group operations evaluated quantumly in each run, at the expense of having to perform multiple runs. Unlike Shor's algorithm, our algorithm does not require the group order to be known. It simultaneously computes both the order and the logarithm. We analyze the probability distributions induced by our algorithm, and by Shor's and Seifert's order-finding algorithms, describe how these algorithms may be simulated when the solution is known, and estimate the number of runs required for a given minimum success probability when making different tradeoffs.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"359 - 407"},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47751125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A note on secure multiparty computation via higher residue symbols 关于利用高残差符号进行安全多方计算的一个注记
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/jmc-2020-0013
Ignacio Cascudo, R. Schnyder
Abstract We generalize a protocol by Yu for comparing two integers with relatively small difference in a secure multiparty computation setting. Yu's protocol is based on the Legendre symbol. A prime number p is found for which the Legendre symbol (· | p) agrees with the sign function for integers in a certain range {−N, . . . , N} ⊂ ℤ. This can then be computed efficiently. We generalize this idea to higher residue symbols in cyclotomic rings ℤ[ζr] for r a small odd prime. We present a way to determine a prime number p such that the r-th residue symbol (· | p)r agrees with a desired function f:A→{ζr0,…,ζrr−1} f:A to left{ {zeta _r^0, ldots ,zeta _r^{r - 1}} right} on a given small subset A ⊂ ℤ[ζr], when this is possible. We also explain how to efficiently compute the r-th residue symbol in a secret shared setting.
摘要我们推广了Yu的一个协议,用于在安全的多方计算环境中比较两个差异相对较小的整数。余的协议是以传奇符号为基础的。发现了一个素数p,其勒让德符号(·|p)与特定范围{−N,…,N}⊂的整数的符号函数一致ℤ. 然后可以有效地计算这一点。我们将这一思想推广到分圆环中的高残数符号ℤ[ζr]对于r是一个小的奇素数。我们提出了一种确定素数p的方法,使得第r个残差符号(·|p)r与期望的函数f:a一致→{ζr0,…,ζrr−1}f:Atoleft{ζ_r^0,ldots,ζ_r^{r-1}}right}在给定的子集A⊂ℤ[ζr],当这是可能的时候。我们还解释了如何在秘密共享设置中有效地计算第r个残差符号。
{"title":"A note on secure multiparty computation via higher residue symbols","authors":"Ignacio Cascudo, R. Schnyder","doi":"10.1515/jmc-2020-0013","DOIUrl":"https://doi.org/10.1515/jmc-2020-0013","url":null,"abstract":"Abstract We generalize a protocol by Yu for comparing two integers with relatively small difference in a secure multiparty computation setting. Yu's protocol is based on the Legendre symbol. A prime number p is found for which the Legendre symbol (· | p) agrees with the sign function for integers in a certain range {−N, . . . , N} ⊂ ℤ. This can then be computed efficiently. We generalize this idea to higher residue symbols in cyclotomic rings ℤ[ζr] for r a small odd prime. We present a way to determine a prime number p such that the r-th residue symbol (· | p)r agrees with a desired function f:A→{ζr0,…,ζrr−1} f:A to left{ {zeta _r^0, ldots ,zeta _r^{r - 1}} right} on a given small subset A ⊂ ℤ[ζr], when this is possible. We also explain how to efficiently compute the r-th residue symbol in a secret shared setting.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"284 - 297"},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0013","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44851427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions 用包含/排除法求弯曲平衡单调旋转对称函数
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/jmc-2020-0021
Elizabeth M. Reid
Abstract There are many cryptographic applications of Boolean functions. Recently, research has been done on monomial rotation symmetric (MRS) functions which have useful cryptographic properties. In this paper we use the inclusion/exclusion principle to construct formulas for the weights of two subclasses of MRS functions: degree d short MRS functions and d-functions. From these results we classify bent and balanced functions of these forms.
摘要布尔函数有许多密码学应用。近年来,人们对具有有用密码学性质的单体旋转对称(MRS)函数进行了研究。本文利用包含/排除原理构造了两个子类MRS函数的权值公式:d次短MRS函数和d次函数。根据这些结果,我们对这些形式的弯曲和平衡函数进行了分类。
{"title":"Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions","authors":"Elizabeth M. Reid","doi":"10.1515/jmc-2020-0021","DOIUrl":"https://doi.org/10.1515/jmc-2020-0021","url":null,"abstract":"Abstract There are many cryptographic applications of Boolean functions. Recently, research has been done on monomial rotation symmetric (MRS) functions which have useful cryptographic properties. In this paper we use the inclusion/exclusion principle to construct formulas for the weights of two subclasses of MRS functions: degree d short MRS functions and d-functions. From these results we classify bent and balanced functions of these forms.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"298 - 304"},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48587099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes Oribatida v1.3系列轻量级认证加密方案
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/jmc-2020-0018
Arghya Bhattacharjee, C. M. López, Eik List, M. Nandi
Abstract Permutation-based modes have been established for lightweight authenticated encryption, as can be seen from the high interest in the ongoing NIST lightweight competition. However, their security is upper bounded by O(σ2/2c) bits, where σ are the number of calls and c is the hidden capacity of the state. The development of more schemes that provide higher security bounds led to the CHES’18 proposal Beetle that raised the bound to O(rσ/2c), where r is the public rate of the state. While authenticated encryption can be performed in an on-line manner, authenticated decryption assumes that the resulting plaintext is buffered and never released if the corresponding tag is incorrect. Since lightweight devices may lack the resources for buffering, additional robustness guarantees, such as integrity under release of unverified plaintexts (Int-RUP), are desirable. In this stronger setting, the security of the established schemes, including Beetle, is limited by O(qpqd/2c), where qd is the maximal number of decryption queries, and qp that of off-line primitive queries, which motivates novel approaches. This work proposes Oribatida, a permutation-based AE scheme that derives s-bit masks from previous permutation outputs to mask ciphertext blocks. Oribatida can provide a security bound of O(rσ2/c+s), which allows smaller permutations for the same level of security. It provides a security level dominated by O(σd2/2c) O(sigma_d^2{/2^c}) under Int-RUP adversaries, which eliminates the dependency on primitive queries. We prove its security under nonce-respecting and Int-RUP adversaries. We show that our Int-RUP bound is tight and show general attacks on previous constructions.
摘要基于置换的模式已经被建立用于轻量级认证加密,这可以从正在进行的NIST轻量级竞争的高度兴趣中看出。然而,它们的安全性是O(σ2/2c)位的上界,其中σ是调用次数,c是状态的隐藏容量。随着更多提供更高安全边界的方案的发展,CHES’18提案Beetle将边界提高到O(rσ/2c),其中r是国家的公共利率。虽然通过身份验证的加密可以以在线方式执行,但通过身份验证解密假设得到的明文是缓冲的,并且如果相应的标签不正确,则永远不会释放。由于轻量级设备可能缺乏用于缓冲的资源,因此需要额外的健壮性保证,例如未经验证的明文(Int RUP)发布下的完整性。在这种更强的设置中,包括Beetle在内的已建立方案的安全性受到O(qpqd/2c)的限制,其中qd是解密查询的最大数量,qp是离线原始查询的最大数目,这激发了新的方法。这项工作提出了Oribatida,这是一种基于排列的AE方案,它从先前的排列输出中导出s位掩码来屏蔽密文块。Oribatida可以提供O(rσ2/c+s)的安全边界,这允许在相同安全级别下进行较小的排列。它提供了一个在Int RUP对手下由O(σd2/2c)O(sima_d^2{/2^c})主导的安全级别,消除了对原始查询的依赖。我们在nonce尊重和Int RUP的对手下证明了它的安全性。我们展示了我们的IntRUP边界是紧密的,并展示了对先前构造的一般攻击。
{"title":"The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes","authors":"Arghya Bhattacharjee, C. M. López, Eik List, M. Nandi","doi":"10.1515/jmc-2020-0018","DOIUrl":"https://doi.org/10.1515/jmc-2020-0018","url":null,"abstract":"Abstract Permutation-based modes have been established for lightweight authenticated encryption, as can be seen from the high interest in the ongoing NIST lightweight competition. However, their security is upper bounded by O(σ2/2c) bits, where σ are the number of calls and c is the hidden capacity of the state. The development of more schemes that provide higher security bounds led to the CHES’18 proposal Beetle that raised the bound to O(rσ/2c), where r is the public rate of the state. While authenticated encryption can be performed in an on-line manner, authenticated decryption assumes that the resulting plaintext is buffered and never released if the corresponding tag is incorrect. Since lightweight devices may lack the resources for buffering, additional robustness guarantees, such as integrity under release of unverified plaintexts (Int-RUP), are desirable. In this stronger setting, the security of the established schemes, including Beetle, is limited by O(qpqd/2c), where qd is the maximal number of decryption queries, and qp that of off-line primitive queries, which motivates novel approaches. This work proposes Oribatida, a permutation-based AE scheme that derives s-bit masks from previous permutation outputs to mask ciphertext blocks. Oribatida can provide a security bound of O(rσ2/c+s), which allows smaller permutations for the same level of security. It provides a security level dominated by O(σd2/2c) O(sigma_d^2{/2^c}) under Int-RUP adversaries, which eliminates the dependency on primitive queries. We prove its security under nonce-respecting and Int-RUP adversaries. We show that our Int-RUP bound is tight and show general attacks on previous constructions.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"305 - 344"},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43381301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reproducible families of codes and cryptographic applications 可复制的代码族和密码学应用
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/jmc-2020-0003
P. Santini, Edoardo Persichetti, M. Baldi
Abstract Structured linear block codes such as cyclic, quasi-cyclic and quasi-dyadic codes have gained an increasing role in recent years both in the context of error control and in that of code-based cryptography. Some well known families of structured linear block codes have been separately and intensively studied, without searching for possible bridges between them. In this article, we start from well known examples of this type and generalize them into a wider class of codes that we call ℱ-reproducible codes. Some families of ℱ-reproducible codes have the property that they can be entirely generated from a small number of signature vectors, and consequently admit matrices that can be described in a very compact way. We denote these codes as compactly reproducible codes and show that they encompass known families of compactly describable codes such as quasi-cyclic and quasi-dyadic codes. We then consider some cryptographic applications of codes of this type and show that their use can be advantageous for hindering some current attacks against cryptosystems relying on structured codes. This suggests that the general framework we introduce may enable future developments of code-based cryptography.
结构化线性分组码,如循环码、准循环码和准二进码,近年来在错误控制和基于码的密码学中发挥了越来越大的作用。一些众所周知的结构化线性分组码家族已经被单独和深入地研究过,而没有在它们之间寻找可能的桥梁。在本文中,我们从这种类型的众所周知的示例开始,并将它们推广到更广泛的代码类别中,我们称之为可再现代码。某些可重现的密码族具有这样的性质:它们可以完全由少量的签名向量生成,因此允许用非常紧凑的方式描述矩阵。我们将这些码表示为紧可再生码,并证明它们包含已知的紧可描述码族,如拟循环码和拟二进码。然后,我们考虑了这种类型的代码的一些密码学应用,并表明它们的使用对于阻碍当前依赖于结构化代码的密码系统的一些攻击是有利的。这表明,我们引入的通用框架可能使基于代码的密码学的未来发展成为可能。
{"title":"Reproducible families of codes and cryptographic applications","authors":"P. Santini, Edoardo Persichetti, M. Baldi","doi":"10.1515/jmc-2020-0003","DOIUrl":"https://doi.org/10.1515/jmc-2020-0003","url":null,"abstract":"Abstract Structured linear block codes such as cyclic, quasi-cyclic and quasi-dyadic codes have gained an increasing role in recent years both in the context of error control and in that of code-based cryptography. Some well known families of structured linear block codes have been separately and intensively studied, without searching for possible bridges between them. In this article, we start from well known examples of this type and generalize them into a wider class of codes that we call ℱ-reproducible codes. Some families of ℱ-reproducible codes have the property that they can be entirely generated from a small number of signature vectors, and consequently admit matrices that can be described in a very compact way. We denote these codes as compactly reproducible codes and show that they encompass known families of compactly describable codes such as quasi-cyclic and quasi-dyadic codes. We then consider some cryptographic applications of codes of this type and show that their use can be advantageous for hindering some current attacks against cryptosystems relying on structured codes. This suggests that the general framework we introduce may enable future developments of code-based cryptography.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"20 - 48"},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42499702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods 随机方法用组合盲法击败常规RSA求幂算法
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/jmc-2020-0010
Margaux Dugardin, W. Schindler, S. Guilley
Abstract Extra-reductions occurring in Montgomery multiplications disclose side-channel information which can be exploited even in stringent contexts. In this article, we derive stochastic attacks to defeat Rivest-Shamir-Adleman (RSA) with Montgomery ladder regular exponentiation coupled with base blinding. Namely, we leverage on precharacterized multivariate probability mass functions of extra-reductions between pairs of (multiplication, square) in one iteration of the RSA algorithm and that of the next one(s) to build a maximum likelihood distinguisher. The efficiency of our attack (in terms of required traces) is more than double compared to the state-of-the-art. In addition to this result, we also apply our method to the case of regular exponentiation, base blinding, and modulus blinding. Quite surprisingly, modulus blinding does not make our attack impossible, and so even for large sizes of the modulus randomizing element. At the cost of larger sample sizes our attacks tolerate noisy measurements. Fortunately, effective countermeasures exist.
摘要Montgomery乘法中发生的额外约简揭示了即使在严格的上下文中也可以利用的侧信道信息。在这篇文章中,我们导出了用Montgomery梯形正则幂和基盲相结合的随机攻击来击败Rivest-Shamir-Adleman(RSA)。也就是说,我们利用RSA算法的一次迭代和下一次迭代中(乘法、平方)对之间的额外约简的预刻画的多元概率质量函数来构建最大似然分类器。与最先进的技术相比,我们的攻击效率(就所需痕迹而言)提高了一倍多。除此之外,我们还将我们的方法应用于正则幂、基盲和模盲的情况。令人惊讶的是,模量盲法并没有使我们的攻击变得不可能,即使对于大尺寸的模量随机化单元也是如此。以较大样本量为代价,我们的攻击容忍有噪声的测量。幸运的是,存在有效的对策。
{"title":"Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods","authors":"Margaux Dugardin, W. Schindler, S. Guilley","doi":"10.1515/jmc-2020-0010","DOIUrl":"https://doi.org/10.1515/jmc-2020-0010","url":null,"abstract":"Abstract Extra-reductions occurring in Montgomery multiplications disclose side-channel information which can be exploited even in stringent contexts. In this article, we derive stochastic attacks to defeat Rivest-Shamir-Adleman (RSA) with Montgomery ladder regular exponentiation coupled with base blinding. Namely, we leverage on precharacterized multivariate probability mass functions of extra-reductions between pairs of (multiplication, square) in one iteration of the RSA algorithm and that of the next one(s) to build a maximum likelihood distinguisher. The efficiency of our attack (in terms of required traces) is more than double compared to the state-of-the-art. In addition to this result, we also apply our method to the case of regular exponentiation, base blinding, and modulus blinding. Quite surprisingly, modulus blinding does not make our attack impossible, and so even for large sizes of the modulus randomizing element. At the cost of larger sample sizes our attacks tolerate noisy measurements. Fortunately, effective countermeasures exist.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"408 - 433"},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46335939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings 基于群环上矩阵的ElGamal密码系统的改进密码分析
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-12-20 DOI: 10.1515/jmc-2019-0054
A. Pandey, Indivar Gupta, D. Singh
Abstract ElGamal cryptosystem has emerged as one of the most important construction in Public Key Cryptography (PKC) since Diffie-Hellman key exchange protocol was proposed. However, public key schemes which are based on number theoretic problems such as discrete logarithm problem (DLP) are at risk because of the evolution of quantum computers. As a result, other non-number theoretic alternatives are a dire need of entire cryptographic community. In 2016, Saba Inam and Rashid Ali proposed a ElGamal-like cryptosystem based on matrices over group rings in ‘Neural Computing & Applications’. Using linear algebra approach, Jia et al. provided a cryptanalysis for the cryptosystem in 2019 and claimed that their attack could recover all the equivalent keys. However, this is not the case and we have improved their cryptanalysis approach and derived all equivalent key pairs that can be used to totally break the ElGamal-like cryptosystem proposed by Saba and Rashid. Using the decomposition of matrices over group rings to larger size matrices over rings, we have made the cryptanalysing algorithm more practical and efficient. We have also proved that the ElGamal cryptosystem proposed by Saba and Rashid does not achieve the security of IND-CPA and IND-CCA.
摘要自Diffie-Hellman密钥交换协议提出以来,ElGamal密码系统已成为公钥密码学中最重要的结构之一。然而,由于量子计算机的发展,基于离散对数问题(DLP)等数论问题的公钥方案面临风险。因此,其他非数论的替代方案是整个密码学界的迫切需要。2016年,Saba Inam和Rashid Ali在《神经计算与应用》中提出了一种基于群环上矩阵的类ElGamal密码系统。贾等人使用线性代数方法,在2019年为该密码系统提供了密码分析,并声称他们的攻击可以恢复所有等效密钥。然而,事实并非如此,我们改进了他们的密码分析方法,导出了所有等价的密钥对,这些密钥对可以用来完全打破Saba和Rashid提出的类似ElGamal的密码系统。通过将群环上的矩阵分解为环上的大矩阵,我们使密码分析算法更加实用和高效。我们还证明了Saba和Rashid提出的ElGamal密码系统不能实现IND-CPA和IND-CCA的安全性。
{"title":"Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings","authors":"A. Pandey, Indivar Gupta, D. Singh","doi":"10.1515/jmc-2019-0054","DOIUrl":"https://doi.org/10.1515/jmc-2019-0054","url":null,"abstract":"Abstract ElGamal cryptosystem has emerged as one of the most important construction in Public Key Cryptography (PKC) since Diffie-Hellman key exchange protocol was proposed. However, public key schemes which are based on number theoretic problems such as discrete logarithm problem (DLP) are at risk because of the evolution of quantum computers. As a result, other non-number theoretic alternatives are a dire need of entire cryptographic community. In 2016, Saba Inam and Rashid Ali proposed a ElGamal-like cryptosystem based on matrices over group rings in ‘Neural Computing & Applications’. Using linear algebra approach, Jia et al. provided a cryptanalysis for the cryptosystem in 2019 and claimed that their attack could recover all the equivalent keys. However, this is not the case and we have improved their cryptanalysis approach and derived all equivalent key pairs that can be used to totally break the ElGamal-like cryptosystem proposed by Saba and Rashid. Using the decomposition of matrices over group rings to larger size matrices over rings, we have made the cryptanalysing algorithm more practical and efficient. We have also proved that the ElGamal cryptosystem proposed by Saba and Rashid does not achieve the security of IND-CPA and IND-CCA.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"266 - 279"},"PeriodicalIF":1.2,"publicationDate":"2020-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2019-0054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47451469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Journal of Mathematical Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1