2018
DOI: 10.1007/978-3-030-03329-3_18
|View full text |Cite
|
Sign up to set email alerts
|

Learning Strikes Again: The Case of the DRS Signature Scheme

Abstract: Lattice signature schemes generally require particular care when it comes to preventing secret information from leaking through signature transcript. For example, the Goldreich-Goldwasser-Halevi (GGH) signature scheme and the NTRUSign scheme were completely broken by the parallelepiped-learning attack of Nguyen and Regev (Eurocrypt 2006). Several heuristic countermeasures were also shown vulnerable to similar statistical attacks.At PKC 2008, Plantard, Susilo and Win proposed a new variant of GGH, informally a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…where D is the signature bound (see Fig 1). We can see that the generated noise vectors follow a Gaussian distribution as far as their norms are concerned, and we believe it makes guessing values much harder for an attacker should they choose to focus on finding specific values or vectors (as it was the case in the original attack from Yu and Ducas [30]). We also conducted experiments, using BKZ20 from the fplll library [28] (see Fig 2).…”
Section: Expected Security Strengthmentioning
confidence: 99%
See 3 more Smart Citations
“…where D is the signature bound (see Fig 1). We can see that the generated noise vectors follow a Gaussian distribution as far as their norms are concerned, and we believe it makes guessing values much harder for an attacker should they choose to focus on finding specific values or vectors (as it was the case in the original attack from Yu and Ducas [30]). We also conducted experiments, using BKZ20 from the fplll library [28] (see Fig 2).…”
Section: Expected Security Strengthmentioning
confidence: 99%
“…For the first step, Yu and Ducas noticed that the coefficients B of the secret key and the 1 could be distinguished via machine learning techniques [30], noticing for one part that the non-diagonal coefficients follow an "absolute-circulant" structure, and the fact that only two types of non-zero values exist. Based on this information, a surprisingly small amount of selected "features" to specialize a "least-square fit" method allowed them to recover both positions and signs of all if not most coefficients B of a secret vector.…”
Section: Yu and Ducas's Attack On The Drs Instantiation Of The Initiamentioning
confidence: 99%
See 2 more Smart Citations
“…Gaussian sampling is important to prevent leaking secret information. Indeed early lattice trapdoors have suffered from statistical attacks [NR06,DN12b,YD18]. In 2008, Gentry, Peikert and Vaikuntanathan first showed that Gaussian distributions [GPV08] can prevent such leaks, and that Klein's algorithm [Kle00] could sample efficiently from a negligibly close distribution.…”
Section: Introductionmentioning
confidence: 99%